نتایج جستجو برای: opportunistic routing

تعداد نتایج: 73783  

2014
Daru Pan Wei Cao Han Zhang Mu Lin

Due to the features of long connection delays, frequent network partitions, and topology unsteadiness, the design of opportunistic networks faces the challenge of how to effectively deliver data based only on occasional encountering of nodes, where the conventional routing schemes do not work properly. This paper proposes a hybrid probability choice routing protocol with buffer management for o...

2014

Many Wireless Sensor Network (WSN) applications necessitate secure multicast services for the purpose of broadcasting delay sensitive data like video files and live telecast at fixed timeslot. This work provides a novel method to deal with end-to-end delay and drop rate of packets. Opportunistic Routing chooses a link based on the maximum probability of packet delivery ratio. Null Key Generatio...

Journal: :International Journal of Wireless and Microwave Technologies 2012

Journal: :International Journal of Ad Hoc and Ubiquitous Computing 2015

Journal: :Sensors 2021

Much attention has been focused lately on the Opportunistic Routing technique (OR) that can overcome restrictions of harsh underwater environment and unique structures Underwater Sensor Networks (UWSNs). OR enhances performance UWSNs in both packet delivery ratio energy saving. In our work; we propose a new routing protocol; called Energy Efficient Depth-based with Void Avoidance for (EEDOR-VA)...

2014
E. Golden Julie

Many Wireless Sensor Network (WSN) applications necessitate secure multicast services for the purpose of broadcasting delay sensitive data like video files and live telecast at fixed timeslot. This work provides a novel method to deal with end-to-end delay and drop rate of packets. Opportunistic Routing chooses a link based on the maximum probability of packet delivery ratio. Null Key Generatio...

2017
Neha Sen

To detect the clone nodes is the fundamental problem in Wireless Sensor Network (WSN). The objective of distributed node clone detection is to detect clone nodes with minimum communication and storage overhead. If the clone nodes remain undetected, it can disrupt the network functions making it vulnerable to attacks. Hence false data can be injected or the legitimate data can be taken out. Mobi...

2013
Sanam Shirazi Beheshtiha Hwee-Pink Tan Masoud Sabaei Fabrice Theoleyre

With recent advances, the trend has shifted from battery-powered wireless sensor networks towards ones powered by ambient energy harvesters (WSN-HEAP). In such networks, operability of the node is dependent on the harvesting rate which is usually stochastic in nature. Therefore, it is necessary to devise routing protocols with energy management capabilities that consider variations in the avail...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید