2020
DOI: 10.1007/s12145-020-00478-1
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficiency maximization algorithm for underwater Mobile sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…Electronic data interchange (EDI) method is constructed by introducing new intermediate system between old and new system, and data can be transferred without any modification in source and new system [26][27][28][29] (Fig. 8).…”
Section: B Data Transfer Via Intermediate System (Methodology 2)mentioning
confidence: 99%
“…Electronic data interchange (EDI) method is constructed by introducing new intermediate system between old and new system, and data can be transferred without any modification in source and new system [26][27][28][29] (Fig. 8).…”
Section: B Data Transfer Via Intermediate System (Methodology 2)mentioning
confidence: 99%
“…Provided that these outlines follow the information on common network practices, the anomaly-based detection system is able to identify obscure attacks. Overall, it is accepted in the research field [22]. A wide variety of anomaly-based detection frameworks have been implemented since the most current decade.…”
Section: Motivation and Gapsmentioning
confidence: 99%