نتایج جستجو برای: two tier networks
تعداد نتایج: 2784240 فیلتر نتایج به سال:
In today's competitive markets, firms try to reduce their supply cost by selecting efficient suppliers using different techniques. Several methods can be applied to evaluate the efficiency of supplier base. This paper develops generalized network data envelopment analysis models to examine the efficiency of two-tier supplier bases under cooperative and non-cooperative strategies where each tier...
Power control techniques are becoming increasingly important for a two-tier network, where a central macrocell is underlaid with femtocells, since cross-tier and co-tier interference severely limits network performance. In this paper, we propose a distributed power control scheme for the uplink transmission of spectrum-sharing femtocell networks based on fictitious game. Each user announces a p...
Mobility management is an important part of the analysis and design ultra-dense LiFi networks. This paper thus presents a two-tier network analyses cross-tier handover rate between primary secondary cells. For different conditions semiangle at half illuminance cells, we propose three coverage models for Using stochastic geometry, closed-form expressions are derived rate, ping-pong sojourn time ...
The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through c...
Multimedia delivery systems, such as Content Distribution Networks (CDNs), improve by knowing the geographic location of their clients. Therefore, we focus on a measurement-based geographic location service of Internet hosts. Such a service infers host locations from delay measurements taken from probe machines toward landmarks, which are hosts with a known geographic location, and the host to ...
Hierarchical architectures are more and more widely adopted for organizing wireless sensor networks. In such architectures, middle-tier nodes take important roles, and preventing a malicious node from impersonating a middle-tier node and injecting falsified messages becomes critical. In this paper, we propose an energy efficient, distributed scheme to secure the multicast messages from the midd...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید