نتایج جستجو برای: routing holes

تعداد نتایج: 91348  

Journal: :CoRR 2013
Muhammad Babar Rasheed Nadeem Javaid Akmal Javaid Mahmood Ashraf Khan Safdar Hussain Bouk Zahoor Ali Khan

Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holed are created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data bac...

Journal: :journal of advances in computer research 2012
sajjad jahanbakhsh gudakahriz shahram jamali mina vajed khiavi

mobile ad hoc networks (manets) are composed of mobile stations communicating through wireless links, without any fixed backbone support. in these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. tora is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it doesn’...

Journal: :Nursing research 2008
Walter Wittich Kenneth Southall

BACKGROUND Patients undergoing facedown positioning have to overcome physical and psychological challenges; however, their perspective and experience are rarely documented in the research literature. OBJECTIVES The objective of this study was to examine the content of a self-motivated diary written by a person who underwent 77 days of facedown positioning after macular hole surgery. Her narra...

Journal: :Social Networks 2003
Jeroen Bruggeman Gianluca Carnabuci Ivar Vermeulen

Diffuse competition due to niche overlap between actors without (direct) ties with each other, constrains their structural autonomy. This is not dealt with in Burt’s mathematical model of his well-known structural holes theory. We fix his model by introducing a network measure of niche overlap. © 2002 Elsevier Science B.V. All rights reserved. JEL classification: L0; L1

Effective and congestion-aware routing is vital to the performance of network-on-chip. The efficient routing algorithm undoubtedly relies on the considered selection strategy. If the routing function returns a number of more than one permissible output ports, a selection function is exploited to choose the best output port to reduce packets latency. In this paper, we introduce a new selection s...

Journal: :journal of artificial intelligence in electrical engineering 0

multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distributetraffic, as well as considerate fault tolerance. in this paper, a new clustering based multi path routingprotocol namely ecrr (energy efficient cluster based routing algorithm for improving reliability) isproposed, which is a new routing algorithm and guarantees the achievement to required qos ...

Journal: :journal of computer and robotics 0
rasoul behravesh faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran mohsen jahanshahi department of computer engineering, central tehran branch, islamic azad university, tehran, iran

multicast routing is one of the most important services in multi radio multi channel (mrmc) wireless mesh networks (wmn). multicast routing performance in wmns could be improved by choosing the best routes and the routes that have minimum interference to reach multicast receivers. in this paper we want to address the multicast routing problem for a given channel assignment in wmns. the channels...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

2002
Jukka-Pekka Salmenkaita

The paper investigates the effects of collaboration networks on inventive productivity within an industrial research environment. A distinction is made between two kinds of network structures: structural holes offering information brokerage opportunities to individuals and network closures supporting co-specialization of individuals. Hypotheses regarding the effects of network positions on the ...

Journal: :journal of advances in computer research 2013
mina vajed khiavi shahram jamali sajjad jahanbakhsh gudakahriz

in this paper, we propose a scheme to improve existing ad-hoc on-demanddistance vector (aodv) routing protocol by discovering and maintaining multiplenon-overlapped routes. our routing protocol is a multipath version of aodvrouting protocol that considers only the disjoint path. due to non-overlappingamong paths, when a link breaks in the network, only one of paths is expired. thepresented rout...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید