18 results with keyword: 'secure aggregation mechanism constrained supervision wireless sensor network'
1) We consider the residual node energy and use the advanced LEACH protocol to select cluster heads. The clus- ter head supervises the cluster members. According to the
N/A
In this study, we have proposed a secure hierarchical data aggregation in wireless sensor networks that maintains energy constrained. While data aggregation, the
N/A
Secure Data Aggregation in Wireless Sensor Network Using Source Privacy Based Elliptic..
N/A
The main aim of data aggregation is to eliminate the redundancy in the transmitted data so as to decrease to the amount of data transmission which saves a considerable amount of
N/A
In this kind of attack, it is not enough that these schemes only focus on data confidentiality and integrity because a passive adversary is able to listen to even encrypted mes-
N/A
The algorithm uses the sensor data from the sensor node and then aggregates the data by using some aggregation algorithms such as centralized approach, LEACH(low energy
N/A
International Journal of Scientific Research in Computer Science, Engineering and Information Technology CSEIT1831456 | Received 16 Feb 2018 | Accepted 28 Feb 2018 | January February
N/A
Therefore, for the network to detect the long term dependency it must develop large enough recurrent weights for the final hidden activations to reflect the indicator symbol and
N/A
I If the wreck is not removed within the deadline (or if the registered owner cannot be contacted), the Affected State may remove the wreck (art. The Affected State may also remove
N/A
For the sustainable development of the region, the cross-border cooperation through the cluster mechanism must be embraced and developed into distinct funding strategies
N/A
In traditional information collection techniques, bunch heads get every one of the information from sensor hubs and afterward kill the repetition by checking
N/A
Place the ATD hook tip at the most secure portion of the prosthesis with a secure purchase: the lingual embrasure space between the pontic and premolar abutment (Fig. 16 Place hook
N/A
Department of Mathematics, Faculty of Science, Imam Khomeini International University, Qazvin, Iran. Email:
N/A
Within the wireless sensor community contains sensor nodes these sensor nodes are scattered then deployed environment within the network and then to form the cluster
N/A
An Aggregation Scenario using Clustering shown in Figure 3 in that cluster heads collect the data from all the neighbours sensor nodes and forwarded that data to
N/A
This project introduces a varied-grid approach for structure-free data aggregation, which tests sensor nodes for data packet size, communication speed and energy
N/A
These include the Support Fund for Vocational Training and Apprenticeship (FAFPA) of Burkina Faso (starting in 2003), the promotion of employment and vocational training, the
N/A