نتایج جستجو برای: fixed protocol
تعداد نتایج: 441915 فیلتر نتایج به سال:
wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...
efficient tuberculosis treatment requires the use of good quality medicines. the present study developed a method of dosage by high performance liquid chromatography (hplc) coupled with the dissolution of a combination of fixed doses of four anti-tuberculous (isoniazid, pyrazinamide, ethambutol hydrochlorate, rifampicine). the elaborated protocol was thereafter used to assess the quality of med...
Ad hoc networks offer infrastructure free operation, where no entity can provide reliable coordination among nodes. Medium Access Control (MAC) protocols in such a network must overcome the inherent unreliability of the network and provide high throughput and adequate fairness to the different flows of traffic. In this paper, we propose a MAC protocol that can achieve an excellent balance betwe...
This paper presents an add-on Class of Service (CoS) layer for wireless mesh networks. The proposed protocol is applicable for contention-based MACs and is therefore compatible with most of the Wireless Local Area Network (WLAN) and Wireless Sensor Network (WSN) protocols. The protocol has a locally centralized control for managing data flows, which either reserve a fixed bandwidth or are weigh...
A class of networked multi-agent systems is studied in this study where each agent has an identical dynamics of a simple integrator and the topology of the connections is fixed. It is proved that, when there are saturation constraints, a general consensus protocol widely used in the literatures for this class of multi-agent systems remains valid. As an extension, a ‘bang-bang’ type of consensus...
This paper presents a protocol software test bed, which was developed for the testing ofa Network Access Authentication Protocol (NAAP) implementation. We demonstrate how modular software design can help in protocol testing and we present a simple software interface that enables flexible protocol testing of protocol implementations. Besides normal use scenarios, the test bed allows automatic te...
Key establishment protocols are used for distributing shared keying material in a secure manner. In 1995, Bellare and Rogaway presented a three-party server-based key distribution (3PKD) protocol. But the protocol was recently found insecure and then was fixed by Raymond Choo et al.. But forward-secrecy is not considered in the revised protocol. In this paper, we demonstrate that it is not forw...
This paper presents a media access protocol designed for LIGHTNING, a WDM testbed currently under construction which has been designed for high-performance supercomputer interconnection. The architecture is based on a dynamically reconfigurable hierarchical WDM network that is being constructed to interconnect a large number of supercomputers and create a distributed shared memory (DSM) environ...
Preparations of Drosophila testes fixed with paraformaldehyde can be stained for F-actin according to the protocol described here. This staining procedure is particularly suitable for staining the male fusome and the cytokinetic contractile ring.
Wireless ATM networks can be implemented by adding mobility support functions to fixed ATM switches. This paper first describes a possible wireless ATM network and protocol architecture relying on “modular addition” of mobility support functions. This architecture sets a broad context where future WATM research can be conducted to elaborate on its various components. Within this context, this p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید