Ara
Toplam kayıt 17, listelenen: 1-10
Low Energy Fixed Clustering Algorithm (LEFCA) for Wireless Sensor Networks
(IEEE, 2015)
Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ...
In silico identification of critical proteins associated with learning process and immune system for Down syndrome
(Public Library Science, 2019)
Understanding expression levels of proteins and their interactions is a key factor to diagnose and explain the Down syndrome which can be considered as the most prevalent reason of intellectual disability in human beings. ...
LSB Image Steganography Based on Blocks Matrix Determinant Method
(KSII-KOR SOC Internet Information, 2019)
Image steganography is one of the key types of steganography where a message to be sent is hidden inside the cover image. The most commonly used techniques for image steganography rely on LSB steganography. In this paper, ...
An energy efficient routing algorithm (X-Centric routing) for sensor networks
(INT INST Informatics & Systemics, 2011)
Recent developments in wireless communications and electronics technologies have enabled the progress in low cost sensor networks. Sensor networks differ from traditional networks in several ways such as the severe energy ...
Energy Aware Multi-Hop Routing Protocol for WSNs
(IEEE, 2018)
In this paper we propose an energy-efficient multi-hop routing protocol for wireless sensor networks (WSNs). The nature of sensor nodes with limited batteries and inefficient protocols are the key limiting factors of the ...
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ...
Non-preemptive priority scheduler with multiple thresholds for network routers
(Pamukkale Univ, 2018)
The vast variety of applications available and being developed for computer networks have different quality of service requirements. One of the most significant ways to satisfy the needs of the applications is the packet ...
Importance of Regional Differences in Brain Throughout Aging for Down Syndrome
(Association for Computing Machinery, 2018)
Down syndrome (DS) which affects approximately one in 700 live births is caused by an extra copy of the long arm of human chromosome 21 (HSA21). Statistical analysis has been done for understanding the protein expression ...
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Improving Energy-Efficiency of WSNs through LEFCA
(Sage Publications Inc, 2016)
Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ...