• No results found

18 results with keyword: 'secure aggregation mechanism constrained supervision wireless sensor network'

Secure Data Aggregation Mechanism based on Constrained Supervision for Wireless Sensor Network

1) We consider the residual node energy and use the advanced LEACH protocol to select cluster heads. The clus- ter head supervises the cluster members. According to the

Protected

N/A

8
0
0
2021
Energy Constrained Secure Hierarchical Data Aggregation in Wireless Sensor Networks

In this study, we have proposed a secure hierarchical data aggregation in wireless sensor networks that maintains energy constrained. While data aggregation, the

Protected

N/A

7
0
0
2021
Secure Data Aggregation in Wireless Sensor Network Using Source Privacy Based Elliptic Curve Cryptography

Secure Data Aggregation in Wireless Sensor Network Using Source Privacy Based Elliptic..

Protected

N/A

5
0
0
2020
Secure Data aggregation in Wireless Sensor Network: A Survey

The main aim of data aggregation is to eliminate the redundancy in the transmitted data so as to decrease to the amount of data transmission which saves a considerable amount of

Protected

N/A

7
0
0
2020
Secure data aggregation in wireless sensor network: a survey

In this kind of attack, it is not enough that these schemes only focus on data confidentiality and integrity because a passive adversary is able to listen to even encrypted mes-

Protected

N/A

13
0
0
2021
Data Aggregation Mechanism For Distributed In Wireless Sensor Network

The algorithm uses the sensor data from the sensor node and then aggregates the data by using some aggregation algorithms such as centralized approach, LEACH(low energy

Protected

N/A

7
0
0
2022
Technique for Secure Data Aggregation in Wireless Sensor Network

International Journal of Scientific Research in Computer Science, Engineering and Information Technology CSEIT1831456 | Received 16 Feb 2018 | Accepted 28 Feb 2018 | January February

Protected

N/A

7
0
0
2020
Using Periodically Attentive Units to Extend the. Temporal Capacity of Simple Recurrent Networks. A thesis presented to the Faculty

Therefore, for the network to detect the long term dependency it must develop large enough recurrent weights for the final hidden activations to reflect the indicator symbol and

Protected

N/A

61
0
0
2021
Swedish Law as an Example The Nairobi Convention Summary. Wreck Removal. Jhonnie Kern University of Gothenburg

I If the wreck is not removed within the deadline (or if the registered owner cannot be contacted), the Affected State may remove the wreck (art. The Affected State may also remove

Protected

N/A

22
0
0
2021
The Economic Security of the Lower Danube by Implementing and Developing Cross-Border Clusters Romania – Ukraine

For the sustainable development of the region, the cross-border cooperation through the cluster mechanism must be embraced and developed into distinct funding strategies

Protected

N/A

7
0
0
2021
WIRELESS SENSOR NETWORK ENERGY-EFFICIENT SECURE PATTERN BASED DATA AGGREGATION

In traditional information collection techniques, bunch heads get every one of the information from sensor hubs and afterward kill the repetition by checking

Protected

N/A

5
0
0
2020
Removing fixed prostheses using the ATD automatic crown and bridge remover

Place the ATD hook tip at the most secure portion of the prosthesis with a secure purchase: the lingual embrasure space between the pontic and premolar abutment (Fig. 16 Place hook

Protected

N/A

7
0
0
2021
On finite groups having a certain number of cyclic subgroups

Department of Mathematics, Faculty of Science, Imam Khomeini International University, Qazvin, Iran. Email:

Protected

N/A

8
0
0
2020
Secure Analysis Of Data Aggregation Technique For Wireless Sensor Network

Within the wireless sensor community contains sensor nodes these sensor nodes are scattered then deployed environment within the network and then to form the cluster

Protected

N/A

5
0
0
2020
How To Secure Data Aggregation In A Wireless Sensor Network

An Aggregation Scenario using Clustering shown in Figure 3 in that cluster heads collect the data from all the neighbours sensor nodes and forwarded that data to

Protected

N/A

6
0
0
2021
Secure Data Aggregation for Multiple Applications in Wireless Sensor Network

This project introduces a varied-grid approach for structure-free data aggregation, which tests sensor nodes for data packet size, communication speed and energy

Protected

N/A

7
0
0
2022
A review of national training funds

These include the Support Fund for Vocational Training and Apprenticeship (FAFPA) of Burkina Faso (starting in 2003), the promotion of employment and vocational training, the

Protected

N/A

122
0
0
2021
A Review of National Training Funds. November 2009

These include the Support Fund for Vocational Training and Apprenticeship (FAFPA) of Burkina Faso (starting in 2003), the promotion of employment and vocational training, the

Protected

N/A

122
0
0
2021

Upload more documents and download any material studies right away!