Realistic Cluster-Based Energy-Efficient and Fault-Tolerant (RCEEFT) Routing Protocol for Wireless Sensor Networks (WSNs) (English)
- New search for: Effah, Emmanuel
- New search for: Thiare, Ousmane
- New search for: Arai, Kohei
- New search for: Kapoor, Supriya
- New search for: Bhatia, Rahul
- New search for: Effah, Emmanuel
- New search for: Thiare, Ousmane
In:
Advances in Information and Communication
: Proceedings of the 2020 Future of Information and Communication Conference (FICC), Volume 1
;
Chapter: 25
;
320-337
;
2020
- Article/Chapter (Book) / Electronic Resource
-
Title:Realistic Cluster-Based Energy-Efficient and Fault-Tolerant (RCEEFT) Routing Protocol for Wireless Sensor Networks (WSNs)
-
Additional title:Advs in Intelligent Syst., Computing
-
Contributors:Arai, Kohei ( editor ) / Kapoor, Supriya ( editor ) / Bhatia, Rahul ( editor ) / Effah, Emmanuel ( author ) / Thiare, Ousmane ( author )
-
Conference:Future of Information and Communication Conference ; 2020 ; San Francisco, CA, CA, USA
-
Published in:Advances in Information and Communication : Proceedings of the 2020 Future of Information and Communication Conference (FICC), Volume 1 ; Chapter: 25 ; 320-337Advances in Intelligent Systems and Computing ; 1129 ; 320-337
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2020-02-25
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The Control Method in Synchronous Frame for DVR to Mitigate the Balanced and Unbalanced Voltage Sag/Swells Phenomenon in Power NetworkHung, Vu Thai / Chun, Shu Hong / Giang, Le Ngoc et al. | 2020
- 2
-
Performance Evaluation of IPv6 and IPv4 for Future TechnologiesIbhaze, Augustus E. / Okoyeigbo, Obinna / Samson, Uyi A. / Obba, Paschal / Okakwu, Ignatius K. et al. | 2020
- 3
-
Investigate the Performance of 240 GHz Millimeter: Wave Frequency over Fiber with 10 and 20 GbpsAl Wahaibi, Fawziya / Al Raweshidy, Hamed et al. | 2020
- 4
-
Low Power BCH Decoder Using Verification Algorithm and Two-Step Parallel Chien Search ArchitectureShebl, Noha K. / Eisa, Saleh M. / Issa, Hanady H. / Shehata, Khaled A. et al. | 2020
- 5
-
A Videogame Driven by the Mind: Are Motor Acts Necessary to Play?Bianchi, Luigi et al. | 2020
- 6
-
Evaluation of RSSI as a Non-visual Target Tracking Technique for Drone ApplicationsLee, Christopher / Semwal, Sudhanshu Kumar et al. | 2020
- 7
-
Power Efficient Multi-relay Cooperative Diversity in Wireless Network Using Hybrid Relaying ProtocolJoshi, Shital / Bhakta, Malaykumar Shitalkumar et al. | 2020
- 8
-
Exploring the Evolutionary BispectrumAl-Shoshan, Abdullah I. et al. | 2020
- 9
-
A Novel Approach to Blockchain-Based Digital Identity SystemMamun, Md Abdullah Al / Alam, S. M. Maksudul / Hossain, Md. Shohrab / Samiruzzaman, M. et al. | 2020
- 10
-
Towards Blockchain-Based GDPR-Compliant Online Social Networks: Challenges, Opportunities and Way ForwardAhmed, Javed / Yildirim, Sule / Nowostawski, Mariusz / Abomhara, Mohamed / Ramachandra, Raghavendra / Elezaj, Ogerta et al. | 2020
- 11
-
Systematization of Knowledge on Scalability Aspect of Blockchain SystemsShukla, Parth Anand / Samet, Saeed et al. | 2020
- 12
-
Smart Dam: Upstream Sensing, Hydro-Blockchain, and Flood Feature Extractions for Dam Inflow PredictionYasuno, Takato / Ishii, Akira / Amakata, Masazumi / Fujii, Junichiro et al. | 2020
- 13
-
Using Blockchain in IoT: Is It a Smooth Road Ahead for Real?Chandel, Sonali / Zhang, Song / Wu, Hanwen et al. | 2020
- 14
-
Developing a Blockchain-Enabled Collaborative Intrusion Detection System: An Exploratory StudyLaufenberg, Daniel / Li, Lei / Shahriar, Hossain / Han, Meng et al. | 2020
- 15
-
An Adaptive Context Modeling Approach Using Genetic Algorithm in IoTs EnvironmentsGad-Elrab, Ahmed A. A. / El-aal, Shereen A. / Ghali, Neveen I. / Zaghrout, Afaf A. S. et al. | 2020
- 16
-
Online Sports Activities Travel Guide (SATG)Hegazy, Ola et al. | 2020
- 17
-
A Heterogeneous Scalable-Orchestration Architecture for Home AutomationApaza-Condori, Jeferson / Castro-Gutierrez, Eveling et al. | 2020
- 18
-
Ambient Intelligence Applications in Architecture: Factors Affecting Adoption DecisionsAbhari, Maryam / Abhari, Kaveh et al. | 2020
- 19
-
Photovoltaic Mobile System Design for Non-interconnected Zones of Meta’s DepartmentRomero, Obeth et al. | 2020
- 20
-
An IoT Based e-Health Platform Using Raspberry PiKhoumeri, El-Hadi / Cheggou, Rabea / Ferhah, Kamila et al. | 2020
- 21
-
Li-Fi Prospect in Internet of Things NetworkIbhaze, Augustus E. / Orukpe, Patience E. / Edeko, Frederick O. et al. | 2020
- 22
-
A Multidimensional Control Architecture for Combined Fog-to-Cloud SystemsMasip-Bruin, Xavi / Souza, Vitor Barbosa / Marín-Tordera, Eva / Ren, Guang-Jie / Jukan, Admela / Garcia, Jordi et al. | 2020
- 23
-
Study of Polynomial Backoff for IEEE 802.11 DCFAldawsari, Bader A. et al. | 2020
- 24
-
Quality of Service Provision Within IEEE 802.11 CSMA/CA ProtocolSamara, Kamil / Hosseini, Hossein / Altahat, Zaid / Stewart, Joseph / Ehley, David / Estrada, Miguel et al. | 2020
- 25
-
Realistic Cluster-Based Energy-Efficient and Fault-Tolerant (RCEEFT) Routing Protocol for Wireless Sensor Networks (WSNs)Effah, Emmanuel / Thiare, Ousmane et al. | 2020
- 26
-
Efficient Cache Architecture for Packet Processing in Internet RoutersYamaki, Hayato et al. | 2020
- 27
-
Optimization of Cultural Heritage Virtual Environments for Gaming ApplicationsInzerillo, Laura / Di Paola, Francesco / Alogna, Yuri / Roberts, Ronald Anthony et al. | 2020
- 28
-
Performance Evaluation of the Update Messages of Locator Identifier Split Protocols Using an IP Paging Mechanism at the End NetworksBussooa, Aadarsh / Mungur, Avinash et al. | 2020
- 29
-
Business and Environmental Perspectives of Submarine Cables in Global MarketAishwarya, N. et al. | 2020
- 30
-
Conditional Convolutional Generative Adversarial Networks Based Interactive Procedural Game Map GenerationPing, Kuang / Dingli, Luo et al. | 2020
- 31
-
Example of the Use of Artificial Neural Network in the Educational ProcessIbragim, Suleimenov / Akhat, Bakirov / Dinara, Matrassulova / Anastasiya, Grishina / Mariya, Kostsova / Grigoriy, Mun et al. | 2020
- 32
-
Hybrid Recommendation System for Young Football Athletes Customized TrainingMatos, Paulo / Rocha, João / Gonçalves, Ramiro / Santos, Filipe / Abreu, David / Soares, Hugo / Martins, Constantino et al. | 2020
- 33
-
AALADIN: Ambient Assisted Living Assistive Device for InternetCedillo, Priscila / Valdez, Wilson / Córdova, Andrés et al. | 2020
- 34
-
Target Localization with Visible Light Communication in High Ambient Light EnvironmentsNyarko, Kofi / Shedu, Emmanuel et al. | 2020
- 35
-
A Minimal Social Weight Wearable Device for Thermal RegulationSerrano, Javier Benedicto / Semwal, Sudhsnahu Kumar et al. | 2020
- 36
-
Virtual Teleportation of a Theatre Audience Onto the Stage: VR as an Assistive TechnologySrinivasan, Saikrishna / Schott, Gareth et al. | 2020
- 37
-
Eliciting Evolving Topics, Trends and Foresight about Self-driving Cars Using Dynamic Topic ModelingAyele, Workneh Y. / Juell-Skielse, Gustaf et al. | 2020
- 38
-
Quality Assurance/Quality Control Engine for Power Outage MitigationChan, S. et al. | 2020
- 39
-
Smart Policing for a Smart World Opportunities, Challenges and Way ForwardYamin, Muhammad Mudassar / Shalaginov, Andrii / Katt, Basel et al. | 2020
- 40
-
Midnight in Tokyo: Mobility Service for Bar-HoppingSato, Chihiro / Okude, Naohito et al. | 2020
- 41
-
Urban Sensibilities, Sharing, and Interactive Public Spaces: In Search of a Good Correlation for Information and Communication in Smart CitiesMcKenna, H. Patricia et al. | 2020
- 42
-
Visual Odometry from Omnidirectional Images for Intelligent TransportationMarcon, Marco / Paracchini, Marco Brando Mario / Tubaro, Stefano et al. | 2020
- 43
-
Drivers and Barriers for Open Government Data Adoption: An Isomorphic Neo-Institutional PerspectiveRoa, Henry N. / Loza-Aguirre, Edison / Flores, Pamela et al. | 2020
- 44
-
“Seeking Privacy Makes Me Feel Bad?”: An Exploratory Study Examining Emotional Impact on Use of Privacy-Enhancing FeaturesHuang, Hsiao-Ying / Bashir, Masooda et al. | 2020
- 45
-
An Adaptive Security Architecture for Detecting Ransomware Attack Using Open Source SoftwareCaliaberah, Prya Booshan / Armoogum, Sandhya / Li, Xiaoming et al. | 2020
- 46
-
Shilling Attack Detection Scheme in Collaborative Filtering Recommendation System Based on Recurrent Neural NetworkGao, Jianling / Qi, Lingtao / Huang, Haiping / Sha, Chao et al. | 2020
- 47
-
Runtime API Signature for Fileless Malware DetectionTarek, Radah / Chaimae, Saadi / Habiba, Chaoui et al. | 2020
- 48
-
Efficient Implementation and Computational Analysis of Privacy-Preserving Auction ProtocolsAlvarez, Ramiro / Nojoumian, Mehrdad et al. | 2020
- 49
-
Dynamic Programming Approach in Conflict Resolution Algorithm of Access Control Module in Medical Information SystemsSamadian, Hiva / Tuiyot, Desmond / Valera, Juan et al. | 2020
- 50
-
Two-Factor Authentication Using Mobile OTP and Multi-dimensional Infinite Hash ChainsRoy, Uttam K. / Mahansaria, Divyans et al. | 2020
- 51
-
IT Security for Measuring Instruments: Confidential Checking of Software FunctionalityPeters, Daniel / Yurchenko, Artem / Melo, Wilson / Shirono, Katsuhiro / Usuda, Takashi / Seifert, Jean-Pierre / Thiel, Florian et al. | 2020
- 52
-
Hardware Transactional Memory as Anti-analysis Technique for Software ProtectorsPalmaro, Federico / Franchina, Luisa et al. | 2020
- 53
-
Development of the Technique for the Identification, Assessment and Neutralization of Risks in Information SystemsBoranbayev, Askar / Boranbayev, Seilkhan / Nurbekov, Askar et al. | 2020
- 54
-
Estimation of the Degree of Reliability and Safety of Software SystemsBoranbayev, Askar / Boranbayev, Seilkhan / Nurbekov, Askar et al. | 2020
- 55
-
A Novel Image Steganography Using Multiple LSB Substitution and Pixel Randomization Using Stern-Brocot SequenceAl Mamun, Md. Abdullah / Alam, S. M. Maksudul / Hossain, Md. Shohrab / Samiruzzaman, M. et al. | 2020
- 56
-
Detecting PE-Infection Based MalwareChen, Chia-Mei / Lai, Gu-Hsin / Chang, Tzu-Ching / Lee, Boyi et al. | 2020
- 57
-
Network Security Monitoring in Automotive DomainGrimm, Daniel / Pistorius, Felix / Sax, Eric et al. | 2020
- 58
-
Android Malware Detection in Large Dataset: Smart ApproachAlahy, Qudrat E. / Chowdhury, Md. Naseef-Ur-Rahman / Soliman, Hamdy / Chaity, Moshrefa Sultana / Haque, Ahshanul et al. | 2020
- 59
-
Design and Implementation of an e-Voting System Based on Paillier EncryptionZhang, Miaomiao / Romero, Steven et al. | 2020
- 60
-
AI-Enabled Digital Forensic Evidence ExaminationChen, Jim Q. et al. | 2020
- 61
-
Stained Visible Watermarking: A Securely Tunable Way of Joint Image Copyright and Privacy ProtectionYao, Xiaoming / Wang, Hao et al. | 2020
- 62
-
sD&D: Design and Implementation of Cybersecurity Educational Game with Highly Extensible FunctionalityKido, Yoshiyuki / Tou, Nelson Pinto / Yanai, Naoto / Shimojo, Shinji et al. | 2020
- 63
-
Mobile System for Determining Geographical Coordinates for Needs of Air Support in Cases of GPS Signals LossJędrasiak, Karol / Nawrat, Aleksander / Recha, Przemysław / Sobel, Dawid et al. | 2020
- 64
-
Cyber ManhuntChandel, Sonali / Chen, Yanjun / Dai, Jiale / Huang, Jianyan et al. | 2020
- 65
-
Smart Agriculture with Advanced IoT Communication and Sensing UnitKrcmarik, David / Moezzi, Reza / Petru, Michal / Koci, Jan et al. | 2020