Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...ijcsta
Wireless Sensor Networks (WSNs) are often prone to risk of security attacks and vulnerabilities. This is because of
the less human intervention in their operations. Hence, novel security mechanisms and techniques are of a prime
importance in these types of networks. In this context, we propose a unique security scheme, which coalesce the
random keying technique with memetics. The application of these kinds of bio-inspired computation in WSNs
provides robust security in the network with the obtained results supporting the security concerns of the network.
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...ijcsta
Clustering protocols have proven to increase the network throughput, reduce delay in packet transfer and save
energy. Hence, in this work, we propose a novel clustering protocol that uses firefly algorithm inspired approach
towards improving the existing basic LEACH protocol for reduction in steady-state energy consumption, aiming to
enhance the network lifetime. The simulated results prove that implanting these kinds of computational intelligence
into the pre-existing protocols considerably improves its performance.
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...ijcsta
Wireless Sensor Networks (WSNs) are often prone to risk of security attacks and vulnerabilities. This is because of
the less human intervention in their operations. Hence, novel security mechanisms and techniques are of a prime
importance in these types of networks. In this context, we propose a unique security scheme, which coalesce the
random keying technique with memetics. The application of these kinds of bio-inspired computation in WSNs
provides robust security in the network with the obtained results supporting the security concerns of the network.
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...ijcsta
Clustering protocols have proven to increase the network throughput, reduce delay in packet transfer and save
energy. Hence, in this work, we propose a novel clustering protocol that uses firefly algorithm inspired approach
towards improving the existing basic LEACH protocol for reduction in steady-state energy consumption, aiming to
enhance the network lifetime. The simulated results prove that implanting these kinds of computational intelligence
into the pre-existing protocols considerably improves its performance.
Proposing a Formal Method for Workflow Modelling: Temporal Logic of Actions (...ijcsta
The study and implementation of formal techniques to aid the design and implementation ofWorkflow Management
Systems (WfMS) is still required. Using these techniques, we can provide this technology with automated reasoning
capacities, which are required for the automated demonstration of the properties that will verify a given model.
This paper develops a formalization of the workflow paradigm based on communication (speech-act theory) by
using a temporal logic, namely, the Temporal Logic of Actions (TLA). This formalization provides the basic
theoretical foundation for the automated demonstration of the properties of a workflow map, its simulation, and
fine-tuning by managers.
Tally Brains is pioneer in Providing Tally Education across the globe. We provide franchisee to potential institutes and new comers also. For more query Visit our website-
Tallybrains.com or mail us to- info@tallybrains.com
Proposing a Formal Method for Workflow Modelling: Temporal Logic of Actions (...ijcsta
The study and implementation of formal techniques to aid the design and implementation ofWorkflow Management
Systems (WfMS) is still required. Using these techniques, we can provide this technology with automated reasoning
capacities, which are required for the automated demonstration of the properties that will verify a given model.
This paper develops a formalization of the workflow paradigm based on communication (speech-act theory) by
using a temporal logic, namely, the Temporal Logic of Actions (TLA). This formalization provides the basic
theoretical foundation for the automated demonstration of the properties of a workflow map, its simulation, and
fine-tuning by managers.
Tally Brains is pioneer in Providing Tally Education across the globe. We provide franchisee to potential institutes and new comers also. For more query Visit our website-
Tallybrains.com or mail us to- info@tallybrains.com