An Energy-Efficient Cross-Layer approach for cloud wireless green communications
In wireless sensor networks (WSN), energy consumption is one of the crucial issues. It is very important to conserve energy at each sensor node to prolong a network lifetime. The main challenge in WSN is to develop an energy efficient algorithm to minimize energy consumption during transmitting info...
| Main Authors: | Sadiq, Ali Safa, Almohammad, Turfah Zeyad, Rabiatul Adawiah, Muhamed Khadri, Ahmed, Abdulghani Ali, Lloret, Jaime |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/18535/ http://umpir.ump.edu.my/id/eprint/18535/1/An%20Energy-Efficient%20Cross-Layer%20Approach1.pdf |
Similar Items
A Developed Network Layer Handover Based Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2015)
by: Sadiq, Ali Safa, et al.
Published: (2015)
An Adaptive Handover Prediction Scheme for Seamless Mobility based-Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2014)
by: Sadiq, Ali Safa, et al.
Published: (2014)
Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2014)
by: Sadiq, Ali Safa, et al.
Published: (2014)
Stock Market Prediction with Big Data Through Hybridization of Data Mining and Optimized Neural Network Techniques
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Improved Geographical Routing in Vehicular Ad Hoc Networks
by: Sadiq, Ali Safa, et al.
Published: (2015)
by: Sadiq, Ali Safa, et al.
Published: (2015)
“What should be done to achieve greater use of cloud computing by higher education institutions”
by: Alajmi, Qasim, et al.
Published: (2016)
by: Alajmi, Qasim, et al.
Published: (2016)
Cloud Computing Technology Setups to Support: The
Learning Management System (LMS) in Higher Education
Institutions in Oman
by: Alajmi, Qasim, et al.
Published: (2016)
by: Alajmi, Qasim, et al.
Published: (2016)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Cloud Computing Delivery and Delivery Models: Opportunity and Challenges
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
E-Learning Models: The Effectiveness of the Cloud-Based E-Learning Model over the Traditional E-Learning Model
by: Alajmi, Qasim, et al.
Published: (2017)
by: Alajmi, Qasim, et al.
Published: (2017)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
A conceptual model of e-learning based on cloud computing adoption in higher education institutions
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
An Efficient Cluster Head Election Algorithm for Client Mesh Networks using Fuzzy Logic Control
by: Adekiigbe, Adebanjo, et al.
Published: (2017)
by: Adekiigbe, Adebanjo, et al.
Published: (2017)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
Cross layer design of network- based fully distributed mobility management for heterogeneous wireless networks
by: Murtadha, Muayad Khalil
Published: (2016)
by: Murtadha, Muayad Khalil
Published: (2016)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Collect and disseminate layer protocol for searching cloud services
by: Arvaree @ Alvar, Thamilvaani
Published: (2014)
by: Arvaree @ Alvar, Thamilvaani
Published: (2014)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Stock prediction by applying hybrid Clustering-GWO-NARX neural network technique
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
by: Mohamed Talib, Amir, et al.
Published: (2010)
by: Mohamed Talib, Amir, et al.
Published: (2010)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
Hybrid clustering-GWO-NARX neural network technique in predicting stock price
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Online computer lab booking system / Rabiatul Adawiah Hasyim
by: Hasyim, Rabiatul Adawiah
Published: (2012)
by: Hasyim, Rabiatul Adawiah
Published: (2012)
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin
by: Nordin, Norfarina
Published: (2020)
by: Nordin, Norfarina
Published: (2020)
Transmission Power Adaption Technique for VANET by Using Piggyback Information
by: Nurul Shafiqa, Ahmad Zabidi, et al.
Published: (2015)
by: Nurul Shafiqa, Ahmad Zabidi, et al.
Published: (2015)
Modified CSMA/CA MAC strategy for IOT enable intra-vehicular wireless communication systems
by: Ali, Md Jahan
Published: (2018)
by: Ali, Md Jahan
Published: (2018)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
The Art of Using Cross-Layer Design in Cognitive Radio Networks
by: Qusay, Medhat Salih, et al.
Published: (2017)
by: Qusay, Medhat Salih, et al.
Published: (2017)
An Energy Efficient Mac Layer Design for Wireless Sensor Network
by: Ghazvini, Mohammad Hossein Fotouhi
Published: (2008)
by: Ghazvini, Mohammad Hossein Fotouhi
Published: (2008)
Cooperative MIMO Communications in Wireless Sensor Networks
by: Ahmad, Mohd Riduan
Published: (2009)
by: Ahmad, Mohd Riduan
Published: (2009)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Similar Items
-
A Developed Network Layer Handover Based Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2015) -
An Adaptive Handover Prediction Scheme for Seamless Mobility based-Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2014) -
Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2014) -
Stock Market Prediction with Big Data Through Hybridization of Data Mining and Optimized Neural Network Techniques
by: Das, Debashish, et al.
Published: (2017) -
Improved Geographical Routing in Vehicular Ad Hoc Networks
by: Sadiq, Ali Safa, et al.
Published: (2015)