Systematic literature review on designing trust-based security for WSNs
نویسندگان
چکیده
منابع مشابه
Review of Trust based Methodologies in WSNs
In this research pa per we have do ne objective study on latest trust bas ed methodologies that are u sed in securing the WSN, the focu ses in our current s tudy have been on the aspect of en ergy and memory consumption due to implementation of tr ust based techniques. We have developed a comparative chart and review of the techniq ues and have found certain limitat ions worthwhile fo r conduct...
متن کاملBehavioral Factors Influencing on Designing Network Governance Model in Health Care Domain: A systematic literature review
Background: Establishment of the intra-organizational collaboration network has become a critical strategy to provide high-quality services with a low cost in the health system. In order to utilize the benefits of collaborative networks, an appropriate governance model in accordance with the health system is required. To design a successful model of network governance, different effective facto...
متن کاملSystematic literature review of fuzzy logic based text summarization
Information Overloadrq is not a new term but with the massive development in technology which enables anytime, anywhere, easy and unlimited access; participation & publishing of information has consequently escalated its impact. Assisting userslq informational searches with reduced reading surfing time by extracting and evaluating accurate, authentic & relevant information are the primary c...
متن کاملdesigning unmanned aerial vehicle based on neuro-fuzzy systems
در این پایان نامه، کنترل نرو-فازی در پرنده هدایت پذیر از دور (پهپاد) استفاده شده است ابتدا در روش پیشنهادی اول، کنترل کننده نرو-فازی توسط مجموعه اطلاعات یک کنترل کننده pid به صورت off-line آموزش دیده است و در روش دوم یک کنترل کننده نرو-فازی on-line مبتنی بر شناسایی سیستم توسط شبکه عصبی rbf پیشنهاد شده است. سپس کاربرد این کنترل کننده در پهپاد بررسی شده است و مقایسه ای ما بین کنترل کننده های معمو...
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2019
ISSN: 2502-4760,2502-4752
DOI: 10.11591/ijeecs.v14.i3.pp1395-1404