Tipo de ítem | Biblioteca actual | Colección | Signatura topográfica | Copia número | Estado | Fecha de vencimiento | Código de barras | |
---|---|---|---|---|---|---|---|---|
Libros | Biblioteca General En biblioteca | Fac de Sistemas y Telecomunicaciones - Carrera de Electrónica y Telecomunicaciones | 621.382 ELHd (Navegar estantería(Abre debajo)) | Ej. 1 | Disponible | BG0025294 |
Incluye índice, figuras
Part I. WSN for complex and mobile-based applications.
1. Mobile object tracking in wide environments using WSNs.-- Related work.-- The problem formulation and the propased solution.-- Experimental results and discussion.-- Summary.--
2. Expand mobile WSN coverage in harsh environments.-- Related work.-- Heterogeneous WSN clustering using genetic algorithm.-- Results and discussion.
3. Hierarchical and clustering WSN models: their requirements for complex applications.-- WSN concepts and terminologies.-- Wireless sensor network challenges.-- Routing models.-- WSN application areas.-- Homogeneous and heterogeneous WSN.
4. Extending homogeneous WSN lifetime in dynamic environments using the clustering model.-- Hypothesis and objectives.-- Network model and energy estimation.-- Energy and spatial factors for longevity.-- Dynamically structuring sensor network using GA.-- Genetic algorithm-based, self-organizing network.-- Results.
5. Optimizing cluster head selection in WSN to prolong its existence.-- WSN construction.-- The proposed GA clustering Method.-- Cluster head for multi-hope clustering model.-- Experiemental results and discussion.
Part II. WSN for secure data processing and live data aggregation.--
6. Secure data transmission in WSN: an overview.-- Overview.-- The working steps for building GASONeC protocol.-- Security problems of wireless sensor network.-- Secure clustering evaluation criteria.-- The existing schemes for secure clustering in WSN.-- Secure clustering alforithms.-- Secure clustering algorithms analysis and evaluation.
7. An encryption model for data processing in WSN.-- Objectives and contributions.-- Related work.-- The proposed secure clustering schema.-- Experimental results and discussion.
8. Using a wireless sensor to acquire live data on a SCADA system, toward monitoring file integrity.-- Reseach objectives.-- Background information.-- The proposed model.-- The proposed models architecture and framework.-- The working steps towards implement the proposed method.-- Conclusion.
No hay comentarios en este titulo.