Micro-electromechanical systems-based technologies for leak detection and localization in water supply networks: A bibliometric and systematic review

S Tariq, Z Hu, T Zayed - Journal of Cleaner Production, 2021 - Elsevier
Leakages from water pipelines cause economic losses and environmental hazards. Despite
the damages, it is challenging to avoid leaks throughout the lifetime. However, leak …

Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications

S Rani, SH Ahmed, R Rastogi - Wireless Networks, 2020 - Springer
Energy is vital parameter for communication in Internet of Things (IoT) applications via
Wireless Sensor Networks (WSN). Genetic algorithms with dynamic clustering approach are …

Data collection for security measurement in wireless sensor networks: A survey

H Xie, Z Yan, Z Yao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Wireless sensor network (WSN) is an indispensible part of Internet of Things that has been
applied in many fields to monitor environments and collect data from surroundings …

[图书][B] Germ Cell Tumor

A Matin - 2012 - books.google.com
The book aims to provide an overview of current knowledge regarding germ cell tumors. It
deals with the clinical presentations, treatment modalities, the biology and genetics of germ …

Secure data transmission in WSN: An overview

M Elhoseny, AE Hassanien, M Elhoseny… - … Sensor Networks: New …, 2019 - Springer
Building a secure routing protocol in WSN is not trivial process. Thee are two main types of
security attacks against WSNs: active and passive. WSN as a new category of computer …

Secure and efficient data transmission for cluster-based wireless sensor networks

H Lu, J Li, M Guizani - IEEE transactions on parallel and …, 2013 - ieeexplore.ieee.org
Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering
is an effective and practical way to enhance the system performance of WSNs. In this paper …

Security threats in wireless network communication-status, challenges, and future trends

AN Kadhim, SB Sadkhan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The wireless air interface is open and accessible to both authorized and unauthorized users
due to the broadcast nature of radio propagation. In a wired network, communication …

Detection of HELLO flood attack on LEACH protocol

S Magotra, K Kumar - 2014 IEEE International Advance …, 2014 - ieeexplore.ieee.org
Various WSN applications use hierarchical routing protocol for routing sensed data to the
sink. LEACH is one of the widely used hierarchical, distributed clustering protocol in WSN. In …

Multi-QoS constraint multipath routing in cluster-based wireless sensor network

J Agarkhed, PY Dattatraya, S Patil - International Journal of Information …, 2021 - Springer
Achieving the best quality as per user requirement is one of the important challenges in
Wireless Sensor Network (WSN) containing numerous sensor nodes with limited battery …

Survey of secure multipath routing protocols for WSNs

SM Zin, NB Anuar, MLM Kiah, I Ahmedy - Journal of Network and Computer …, 2015 - Elsevier
In sensing data to the base station, wireless sensor networks (WSNs) face some security
challenges since such networks impose resource constraints that need to be addressed by …