Search
Now showing items 1-10 of 28
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Routing with (p-percent) partial flooding for opportunistic networks
(2010)
Opportunistic networks are one of the fast developing research areas in mobile communications. Under opportunistic networks mobile nodes try to communicate with other nodes without any prior information and knowledge about ...
Improving Energy-Efficiency of WSNs through LEFCA
(Sage Publications Inc, 2016)
Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ...
Nearest Fixed Clustering Algorithm (NFCA) for Wireless Sensor Networks
(IEEE, 2016)
The objective of reducing energy consumption at the sensor nodes has become a key research area for wireless sensor networks (WSNs) in recent years. With the steady increase in the cost of energy the existing algorithms ...
Received signal strength based least squares lateration algorithm for indoor localization
(Pergamon-Elsevier Science Ltd, 2018)
Following the success of accurate location estimation for outdoor environments locating targets in indoor environments has become an important research area. Accurate location estimation of targets for indoor environments ...
Energy Aware Multi-Hop Routing Protocol for WSNs
(IEEE, 2018)
In this paper we propose an energy-efficient multi-hop routing protocol for wireless sensor networks (WSNs). The nature of sensor nodes with limited batteries and inefficient protocols are the key limiting factors of the ...
Non-preemptive priority scheduler with multiple thresholds for network routers
(Pamukkale Univ, 2018)
The vast variety of applications available and being developed for computer networks have different quality of service requirements. One of the most significant ways to satisfy the needs of the applications is the packet ...
Routing performance analysis of opportunistic networks with flooding and partial flooding methods [Fırsatçı aǧlarda taşırma ve kısmi taşırma yöntemleriyle yönlendirme performans analizi]
(IEEE, 2012)
Opportunistic networks is one of the fast developing research areas in mobile communications. Under opportunistic networks mobile nodes try to communicate with other nodes without any prior information and knowledge about ...
Traffic shaping schemes for improving QoS in data networks
(2012)
As the typical characteristics of traffic in data networks are bursty which is difficult to handle traffic shaping schemes are used for regulating the average rate and hurstiness of a flow of data that enters into the ...
In silico identification of critical proteins associated with learning process and immune system for Down syndrome
(Public Library Science, 2019)
Understanding expression levels of proteins and their interactions is a key factor to diagnose and explain the Down syndrome which can be considered as the most prevalent reason of intellectual disability in human beings. ...