نتایج جستجو برای: شبکههای بیسیم ad hoc

تعداد نتایج: 101924  

P Panahi

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

Journal: :JACC. Cardiovascular interventions 2009
Edward L Hannan Zaza Samadashvili Gary Walford David R Holmes Alice Jacobs Samin Sharma Stanley Katz Spencer B King

OBJECTIVES Our aim was to compare longer-term outcomes for ad hoc percutaneous coronary intervention (PCI) and non-ad hoc PCI. BACKGROUND Ad hoc PCIs, whereby PCI is performed immediately after cardiac catheterization, has become the most common way of performing PCI. However, no studies have compared longer-term outcomes for ad hoc and non-ad hoc PCIs. METHODS A total of 46,565 New York St...

ژورنال: :پردازش علائم و داده ها 0
سیدحمید یزدانی seyed hamid yazdani yazd universityدانشگاه یزد، دانشکده برق و کامپیوتر حمیدرضا ابوطالبی hamid reza abutalebi yazd universityدانشگاه یزد، دانشکده برق و کامپیوتر

با توجه به وجود عوامل بسیار در تخریب سیگنال گفتار، بهسازی این سیگنال از اهمیت زیادی برخوردار شده است. شکل دهی پرتو یکی از روش های مطرح برای بهسازی گفتار است که با استفاده از آرایه های میکروفونی صورت می پذیرد. با توجه به محدودیت های موجود در نحوه چینش میکروفون ها، پنجره ای به سوی بحث آرایه های میکروفونی با چیدمان نامنظم (ad-hoc) گشوده شده است. با فرض عدم شناخت نسبت به مکان و چینش میکروفون ها و ه...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

Journal: :amirkabir international journal of electrical & electronics engineering 2013
a. anbaran a. mohammadi a. abdipour

this paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (espar). the proposed method is capable of providing better capacity compared to the conventional espar. the termination of each antenna element in this structure comprises a pin diode in addition to a varactor. using pin diode besides the varactor provides more degrees of freed...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - پژوهشکده برق و کامپیوتر 1391

به علت گسترش روزمره در شبکه های ارتباطاتی بی سیم، تلاش برای بالا بردن قابلیت اطمینان و سرعت ارسال در این کانال ها مورد توجه مراکز تحقیقاتی و پژوهشگران قرار گرفته است. استفاده از دایورسیتی مشارکتی با بهره گیری از رله، برای ارسال یا ارسال مجدد اطلاعات، باعث بهبود قابلیت اطمینان می شود. با انتخاب رله مناسب، می توان پارامترهای کلیدی سیستم، افزایش قابلیت اطمینان و سرعت ارسال را در شبکه های بی سیم، ب...

Journal: :iranian journal of fuzzy systems 2013
mohammad rahmanimanesh saeed jalili

in this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (aodv) routing protocol is proposed. in the method, the required features for describing the normal behavior of aodv are defined via step by step analysis of aodv and independent of any attack. in order to learn the normal behavior of aodv, a fuzzy averaging method is used fo...

Journal: :journal of advances in computer research 2016
mona mojtabaee morteza romoozi hamideh babaei

content discovery is one of the fundamental issues that determines the architecture and performance of content distribution networks based on peer-to-peer (p2p) networks. to administrate the costs and discoveries, peers of a p2p network communicate with each other by one or more overlay layers. the condition of node’s relations in overlay networks, have a great impact in efficiency of networks....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید