These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

288 related articles for article (PubMed ID: 22163424)

  • 21. Supervisory control of mobile sensor networks: math formulation, simulation, and implementation.
    Giordano V; Ballal P; Lewis F; Turchiano B; Zhang JB
    IEEE Trans Syst Man Cybern B Cybern; 2006 Aug; 36(4):806-19. PubMed ID: 16903366
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.
    Toyonaga S; Kominami D; Murata M
    Sensors (Basel); 2016 Aug; 16(8):. PubMed ID: 27548177
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Minimum expected delay-based routing protocol (MEDR) for Delay Tolerant Mobile Sensor Networks.
    Feng Y; Liu M; Wang X; Gong H
    Sensors (Basel); 2010; 10(9):8348-62. PubMed ID: 22163658
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Energy-Efficient and Secure Opportunistic Routing Protocol for WSN: Performance Analysis with Nature-Inspired Algorithms and Its Application in Biomedical Applications.
    Bangotra DK; Singh Y; Kumar N; Kumar Singh P; Ojeniyi A
    Biomed Res Int; 2022; 2022():1976694. PubMed ID: 35372577
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Prioritized degree distribution in wireless sensor networks with a network coded data collection method.
    Wan J; Xiong N; Zhang W; Zhang Q; Wan Z
    Sensors (Basel); 2012 Dec; 12(12):17128-54. PubMed ID: 23235451
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Opportunistic Multipath Routing in Long-Hop Wireless Sensor Networks.
    Kim S; Kim BS; Kim KH; Kim KI
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31547159
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
    Saleem K; Derhab A; Orgun MA; Al-Muhtadi J; Rodrigues JJ; Khalil MS; Ali Ahmed A
    Sensors (Basel); 2016 Mar; 16(4):460. PubMed ID: 27043572
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A cross-layer duty cycle MAC protocol supporting a pipeline feature for wireless sensor networks.
    Tong F; Xie R; Shu L; Kim YC
    Sensors (Basel); 2011; 11(5):5183-201. PubMed ID: 22163895
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Using reputation systems and non-deterministic routing to secure wireless sensor networks.
    Moya JM; Vallejo JC; Fraga D; Araujo A; Villanueva D; de Goyeneche JM
    Sensors (Basel); 2009; 9(5):3958-80. PubMed ID: 22412345
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A QoS-guaranteed coverage precedence routing algorithm for wireless sensor networks.
    Jiang JA; Lin TS; Chuang CL; Chen CP; Sun CH; Juang JY; Lin JC; Liang WW
    Sensors (Basel); 2011; 11(4):3418-38. PubMed ID: 22163804
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.
    Zhang G; Chen Z; Tian L; Zhang D
    PLoS One; 2015; 10(9):e0139326. PubMed ID: 26421843
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Multi-hop routing-based optimization of the number of cluster-heads in wireless sensor networks.
    Nam CS; Han YS; Shin DR
    Sensors (Basel); 2011; 11(3):2875-84. PubMed ID: 22163771
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory.
    Feng R; Xu X; Zhou X; Wan J
    Sensors (Basel); 2011; 11(2):1345-60. PubMed ID: 22319355
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.
    Banković Z; Fraga D; Moya JM; Vallejo JC
    Sensors (Basel); 2012; 12(8):10834-50. PubMed ID: 23112632
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Multiconstraint-Aware Routing Mechanism for Wireless Body Sensor Networks.
    Bangash JI; Khan AW; Khan A; Khan A; Uddin MI; Hua Q
    J Healthc Eng; 2021; 2021():5560809. PubMed ID: 33868621
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Fast decision algorithms in low-power embedded processors for quality-of-service based connectivity of mobile sensors in heterogeneous wireless sensor networks.
    Jaraíz-Simón MD; Gómez-Pulido JA; Vega-Rodríguez MA; Sánchez-Pérez JM
    Sensors (Basel); 2012; 12(2):1612-24. PubMed ID: 22438728
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Wireless Intelligent Sensors Management Application Protocol-WISMAP.
    Cuevas-Martinez JC; Gadeo-Martos MA; Fernandez-Prieto JA; Canada-Bago J; Yuste-Delgado AJ
    Sensors (Basel); 2010; 10(10):8827-49. PubMed ID: 22163383
    [TBL] [Abstract][Full Text] [Related]  

  • 40. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.
    Lee C; Jeong T
    Sensors (Basel); 2011; 11(5):5383-401. PubMed ID: 22163905
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 15.