X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
accuracy (2) 2
cryptography (2) 2
wireless sensor networks (2) 2
agricultural engineering (1) 1
amplitude modulation (1) 1
analysis (1) 1
aspergillus niger (1) 1
aspergillus-niger (1) 1
attack detection (1) 1
authentication (1) 1
bioconversion (1) 1
biodiesel production (1) 1
biokonversion (1) 1
biotechnology & applied microbiology (1) 1
communication system security (1) 1
conventional neural network (1) 1
crude glycerol (1) 1
digital signatures (1) 1
dihydroxyacetone (1) 1
educational institutions (1) 1
energy & fuels (1) 1
engineering (1) 1
engineering schools (1) 1
fermentation (1) 1
global positioning system (1) 1
gluconobacter-oxydans (1) 1
glycerin (1) 1
glycerine (1) 1
glycerol (1) 1
hardware (1) 1
hefeextrakt (1) 1
hill climbing key (1) 1
histogram (1) 1
identity based signatures (1) 1
ieee 802.11 standards (1) 1
inhibition (1) 1
issue authority (1) 1
kinetic models (1) 1
kinetics-model (1) 1
kinetisches modell (1) 1
künstliches neuronales netz (1) 1
leaf classification (1) 1
leaf identification system (1) 1
leaf recognition system (1) 1
leaf vein (1) 1
leafilia (1) 1
localization (1) 1
malic acid (1) 1
malic-acid (1) 1
md5 (1) 1
monitoring (1) 1
multipath (1) 1
neural networks (1) 1
neuronal-networks (1) 1
niobium (1) 1
optimization (1) 1
oryzae (1) 1
pathway (1) 1
process-optimisation (1) 1
prozessoptimierung (1) 1
recurrent neural network (1) 1
response-surface methodology (1) 1
response-surface-methode (1) 1
response-surface-methodology (1) 1
routing (1) 1
secret handshake (1) 1
smart phone application (1) 1
span (1) 1
spoofing attack (1) 1
strain (1) 1
substrate (1) 1
support vector machines (1) 1
tensorflow (1) 1
venation (1) 1
wireless communication (1) 1
wireless network security (1) 1
wireless sensor network (1) 1
yeast-extract (1) 1
äpfelsäure (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Bioresource Technology, ISSN 0960-8524, 06/2019, Volume 281, pp. 18 - 25
Journal Article
International Journal of Engineering and Technology(UAE), 2018, Volume 7, Issue 3, pp. 129 - 132
Journal Article
International Journal of Engineering and Technology(UAE), 2018, Volume 7, Issue 3, pp. 114 - 117
Journal Article
Procedia Engineering, ISSN 1877-7058, 2012, Volume 38, pp. 504 - 510
Sensor networks may suffer different types of malicious attacks like false report injection attacks, Selective forwarding attacks. Military uses sensor... 
Hill Climbing key | Routing | wireless sensor networks | multipath | Multipath | Wireless sensor networks | Hill climbing key
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2016, Volume 425, pp. 581 - 592
Conference Proceeding
International Conference on Information Communication and Embedded Systems (ICICES2014), 02/2014, pp. 1 - 5
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through... 
Wireless communication | Support vector machines | localization | Accuracy | IEEE 802.11 Standards | Wireless network security | attack detection | Educational institutions | spoofing attack | Communication system security | Cryptography
Conference Proceeding
2010 First International Conference on Integrated Intelligent Computing, 08/2010, pp. 277 - 282
The Pervasive computing and sensor networks are emerging as key application drivers for wireless networks. Localization is of fundamental importance to... 
Wireless sensor networks | Accuracy | Amplitude modulation | Hardware | Niobium | Monitoring | Global Positioning System
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.