Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks
کلیه مقالات این لیست دارای ترجمه آماده می باشند اما در صورتی که مقاله لاتین دیگری از سایر کتگوری های سایت مد نظر شماست که تا کنون به زبان فارسی ترجمه نشده است، واحد ترجمه پایگاه ISI Articles با همکاری تنی چند از اساتید و مترجمان با سابقه، آمادگی دارد آن را در اسرع وقت و با کیفیت مطلوب برای شما ترجمه نماید.
Improved Cuckoo Search-based Clustering Protocol for Wireless Sensor Networks
Simulation methodology and performance analysis of network coding based transport protocol in wireless big data networks
Landscape of connectivity. Measuring and representing fluctuations in wireless network traffic in space
An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks
Software defined wireless sensor networks application opportunities for efficient network management: A survey
A recharging distance analysis for wireless sensor networks
A wireless sensor network prototype for post-occupancy troubleshooting of building systems
Effective implementation of Energy Aware Routing for Wireless Sensor Network
Incremental anomaly detection using two-layer cluster-based structure
Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic
Anomaly Detection in Roads with a Data Mining Approach
Reliability of Sensor Nodes in Wireless Sensor Networks of Cyber Physical Systems
An ensemble learning framework for anomaly detection in building energy consumption
Fuzzified Cuckoo based Clustering Technique for Network Anomaly Detection
On the combination of support vector machines and segmentation algorithms for anomaly detection: A petroleum industry comparative study
Anomaly Detection in Clinical Data of Patients Undergoing Heart Surgery
Wireless Network Topological Routing in Wireless Sensor Networks ☆
PCA-based multivariate statistical network monitoring for anomaly detection
Semi-supervised Statistical Approach for Network Anomaly Detection ☆
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems ☆
Optimising resource costs of cloud computing for education
Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing
BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks
Distributed model-based nonlinear sensor fault diagnosis in wireless sensor networks
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks
Inter-cellular scheduler for 5G wireless networks
Performance Evaluation and Measurement for Energy Efficient Wireless Networks ☆
Fast heuristics for the frequency channel assignment problem in multi-hop wireless networks
Full-duplex communication for future wireless networks: Dynamic resource block allocation approach
Radio resource management for user-relay assisted OFDMA-based wireless networks
PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks ☆
An intersection-to-intersection travel time estimation and route suggestion approach using vehicular ad-hoc network
Efficient authentication and access control of message dissemination over vehicular ad hoc network ☆
An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks
The monitoring and managing application of cloud computing based on Internet of Things
Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb ☆
EATS: Energy-Aware Tasks Scheduling in Cloud Computing Systems ☆
A mobile payment mechanism with anonymity for cloud computing
Modified Round Robin Algorithm for Resource Allocation in Cloud Computing ☆
A Heuristic Algorithm for Multi-Site Computation Offloading in Mobile Cloud Computing ☆
A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network ☆
Imperialist competitive algorithm with PROCLUS classifier for service time optimization in cloud computing service composition
Two-phase hybrid cryptography algorithm for wireless sensor networks
DS-MAC: An energy efficient demand sleep MAC protocol with low latency for wireless sensor networks
E-learning Systems Based on Cloud Computing: A Review ☆
Hybrid Algorithm for Resource Provisioning of Multi-tier Cloud Computing ☆
Robust access control framework for mobile cloud computing network
An SDMA-based MAC protocol for wireless ad hoc networks with smart antennas ☆
Random effects logistic regression model for anomaly detection
Fault-tolerant routing mechanism based on network coding in wireless mesh networks
Two dimensional noncausal AR-ARCH model: Stationary conditions, parameter estimation and its application to anomaly detection
A study on traffic signal control at signalized intersections in vehicular ad hoc networks
Support vector regression for anomaly detection from measurement histories
Design of face recognition algorithm using PCA -LDA combined for hybrid data pre-processing and polynomial-based RBF neural networks : Design and its application
Integrated strategic and tactical planning in a supply chain network design with a heuristic solution method
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches
Distribution-based anomaly detection via generalized likelihood ratio test: A general Maximum Entropy approach