4.7 Article

Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Telecommunications

QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks

Thangaramya Kalidoss et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Theory & Methods

SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things

David Airehrour et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Artificial Intelligence

DECSA: hybrid dolphin echolocation and crow search optimization for cluster-based energy-aware routing in WSN

N. Mahesh et al.

NEURAL COMPUTING & APPLICATIONS (2019)

Article Telecommunications

Secure and Trust-Aware Routing Scheme in Wireless Sensor Networks

Azam Beheshtiasl et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Article Computer Science, Information Systems

An empower hamilton loop based data collection algorithm with mobile agent for WSNs

Jin Wang et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2019)

Review Computer Science, Information Systems

MOFPL: Multi-objective fractional particle lion algorithm for the energy aware routing in the WSN

Reeta Bhardwaj et al.

PERVASIVE AND MOBILE COMPUTING (2019)

Article Computer Science, Information Systems

Adaptive Trust-Based Routing Protocol for Large Scale WSNs

Nor Azimah Khalid et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Energy-Efficient Routing in WSN: A Centralized Cluster-Based Approach via Grey Wolf Optimizer

S. M. Mahdi H. Daneshvar et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

EESRA: Energy Efficient Scalable Routing Algorithm for Wireless Sensor Networks

Eyman Fathelrhman Ahmed Elsmany et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs

Khalid Haseeb et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks

Ahmed Al-Baz et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Particle Swarm Optimization-Based Unequal and Fault Tolerant Clustering Protocol for Wireless Sensor Networks

Tarunpreet Kaur et al.

IEEE SENSORS JOURNAL (2018)

Article Telecommunications

An Improved Routing Algorithm Based on Ant Colony Optimization in Wireless Sensor Networks

Yongjun Sun et al.

IEEE COMMUNICATIONS LETTERS (2017)

Article Computer Science, Information Systems

A Survey on Successors of LEACH Protocol

Sunil Kumar Singh et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Multi-objective fractional artificial bee colony algorithm to energy aware routing protocol in wireless sensor network

Rajeev Kumar et al.

WIRELESS NETWORKS (2016)

Article Computer Science, Interdisciplinary Applications

The Whale Optimization Algorithm

Seyedali Mirjalili et al.

ADVANCES IN ENGINEERING SOFTWARE (2016)

Article Engineering, Electrical & Electronic

An Energy-Efficient Routing Algorithm for Software-Defined Wireless Sensor Networks

Wei Xiang et al.

IEEE SENSORS JOURNAL (2016)

Review Computer Science, Hardware & Architecture

Corona based deployment strategies in wireless sensor network: A survey

Atiq Ur Rahman et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Review Computer Science, Hardware & Architecture

Applications of wireless sensor networks for urban areas: A survey

Bushra Rashid et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Proceedings Paper Computer Science, Information Systems

An Enhanced Authentication Mechanism to Secure Re-Programming in WSN

Pooja Nandu et al.

INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA) (2015)

Article Automation & Control Systems

Real-Time Implementation of a Harmony Search Algorithm-Based Clustering Protocol for Energy-Efficient Wireless Sensor Networks

Duc Chinh Hoang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Information Systems

TC-BAC: A trust and centrality degree based access control model in wireless sensor networks

Junqi Duan et al.

AD HOC NETWORKS (2013)

Article Computer Science, Hardware & Architecture

SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems

Anupam Das et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)

Article Computer Science, Information Systems

RLM: A General Model for Trust Representation and Aggregation

Xiaofeng Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2012)

Article Computer Science, Information Systems

SECURING WIRELESS SENSOR NETWORKS: A SURVEY

Yun Zhou et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)

Article Computer Science, Information Systems

A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS

Djamel Djenouri et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2005)