نتایج جستجو برای: route finding analysis
تعداد نتایج: 3069907 فیلتر نتایج به سال:
In this paper we tackle the problem of generating natural route descriptions on the basis of input obtained from a commercially available way-finding system. Our framework and architecture incorporates the use of generic natural language generation techniques. Through examples we demonstrate that it is possible to bridge the gap between underlying representation and natural sounding description...
Rapid Way Application was developed to help drivers in finding the optimum route using GPS to reach a destination especially if there were any blocked routes/roads caused by accidents, roadwork, natural disaster, etc. This paper presents determinants for user‘s intention to use the Rapid Way Application in Rapid Way Portal. A survey was conducted with 100 respondents to determine the level of u...
In this paper we propose an approach to improve the performance of existing flood based routing algorithm Ad-hoc on demand Distance Vector Routing [2] for mobile Ad-hoc wireless networks based on heuristic searching technique. Flooding technique is often used for route discovery in on demand mechanism in MANET such as AODV, DSR. To avoid the problem of wireless broadcast storm, the heuristic se...
Energy aware routing protocols can be classified into energy saver and energy manager. Energy saver protocols decrease energy consumption totally. Most of them try to find the shortest path between source and destination to reduce energy consumption. But energy manager protocols balance energy consumption in network to avoid network partitioning. Finding best route only based on energy balancin...
Spatial navigation relies on the brain ability to combine information from multiple streams in order to generate a cognitive map, which is then used, for example, to find routes to a goal. This takes place in a network of brain structures centered on the hippocampus. Hippocampal place cells, cells that activate only when the animal is in a particular location in the environment combine sensory ...
Standard on-demand routing protocols in wireless ad hoc networks were not originally designed to deal with security threats. Because of that, malicious users have been finding ways to attack networks. Rushing attacks represent one of such possibilities. In these attacks, malicious nodes forward the Route Request (RREQ) packets, asking for a route, to the destination node quicker than the legiti...
The arrival of cloud computing age makes data outsourcing an important and convenient application. More more individuals organizations outsource large amounts graph to the platform (CCP) for sake saving cost. As server on CCP is not completely honest trustworthy, are usually encrypted before they sent CCP. optimal route finding a popular operation which frequently used in many fields. with supp...
We present the concept of greedy distinguishers and show how some simple observations and the well known greedy heuristic can be combined into a very powerful strategy (the Greedy Bit Set Algorithm) for efficient and systematic construction of distinguishers and nonrandomness detectors. We show how this strategy can be applied to a large array of stream and block ciphers, and we show that our m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید