Research Article

Citations for "Indoor Child Tracking in Wireless Sensor Network using Fuzzy Logic Technique"

Citation to this article as recorded by ASCI logo

Abidoye, A.P., N.A. Azeez, A.O. Adesina and K.K. Agbele, 2011. UDCA: Energy optimization in wireless sensor networks using uniform distributed clustering algorithms. Res. J. Inform. Technol., 3: 191-200.
CrossRef  |  

Ayanzadeh, R., A.S.Z. Mousavi and E. Shahamatnia, 2012. Fuzzy cellular automata based random numbers generation. Trends Applied Sci. Res., 7: 96-102.
CrossRef  |  Direct Link  |  

Azeez, N.A., A.P. Abidoye, K.K. Agbele and A.O. Adesina, 2012. A dependable model for attaining maximum authentication security procedure in a grid based environment. Trends Appl. Sci. Res., 7: 78-86.
CrossRef  |  

Lee, S., Y. Lee and S.G. Yoo, 2012. A specification based intrusion detection mechanism for the LEACH protocol. Inform. Technol. J., 11: 40-48.
CrossRef  |  Direct Link  |  

Mahmood, A., K. Shi and S. Khatoon, 2012. Mining data generated by sensor networks: a survey. Inform. Technol. J., 11: 1534-1543.
CrossRef  |  Direct Link  |  

Rozyyev, A., H. Hasbullah and F. Subhan, 2012. Combined k-nearest neighbors and fuzzy logic indoor localization technique for wireless sensor network. Res. J. Inform. Technol., 4: 155-165.
CrossRef  |  Direct Link  |  

Citations in impact factor journal as recorded by Crossref logo

Data Mining Techniques for Wireless Sensor Networks: A Survey
International Journal of Distributed Sensor Networks Vol. 9, Issue 7, 406316, 2013

Research on Reliability-Oriented Data Fusaggregation Algorithm in Large-Scale Probabilistic Wireless Sensor Networks
International Journal of Distributed Sensor Networks Vol. 10, Issue 5, 739102, 2014

Citation to this article as recorded by Crossref logo

Step Length Estimation Using Sensor Fusion
2020 IEEE International Conference on Flexible and Printable Sensors and Systems (FLEPS)

A Specification Based Intrusion Detection Mechanism for the LEACH Protocol
Information Technology Journal Vol. 11, Issue 1, 40, 2012

A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment
Trends in Applied Sciences Research Vol. 7, Issue 1, 78, 2012

Fuzzy Cellular Automata Based Random Numbers Generation
Trends in Applied Sciences Research Vol. 7, Issue 1, 96, 2012

Data fusaggregation algorithm based on dynamic minimal spanning tree routing protocol
Acta Physica Sinica Vol. 63, Issue 9, 090206, 2014

Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

©  2022 Science Alert. All Rights Reserved