نتایج جستجو برای: after receiving this alerting message

تعداد نتایج: 6974929  

Journal: :IJPEDS 2012
Ivan Stojmenovic Adnan Afsar Khan Nejib Zaguia

In a broadcasting task, source node wants to send the same message to all the other nodes in the network. Existing solutions range from connected dominating set (CDS) based on static networks to blind flooding for moderate mobility and hyper-flooding for highly mobile and frequently partitioned networks. Existing protocols for all scenarios are based on some threshold parameters (e.g. speed, wh...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زبانهای خارجی 1391

as polysemy is encountered frequently in english as foreign language. fl learners’ ability to disambiguate polysemous verbs becomes critical to their comprehension in the target language. this thesis, accordingly, investigated how iranian efl learners achieved comprehension of english polysemous verbs by using three different types of cues: (1) elaborated context, (2) semantic frames, and (...

Journal: :JCM 2009
Xianbin Wang Md. Jahidur Rahman Sung Ik Park Heung Mook Kim Yiyan Wu

In today’s world, having a reliable communication system during emergency situations is of paramount importance to lessen the impact of the disasters. This paper proposes an emergency communication technique which is enabled by ATSC DTV transmitter identification (TxID) watermark signal. Theoretical and simulation results show that ATSC TxID watermark signal can reach a larger coverage area tha...

2013
Karl Wolf

The Common Alerting Protocol (CAP) is an open standard, which is universally used for early warning systems and other emergency information systems. Future early warning systems will also disseminate CAP warning messages to location aware Internet devices, such as notebooks, Internet phones or Internet-enabled television sets. These Internet devices have the option to acquire their current loca...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

plagiarism in esl/efl learning contexts has been established as a dynamic and multi-layered phenomenon and has become a topic engaging many researchers in a heated debate in recent years. comparisons of student-generated texts with their source texts have shown that students rely on source texts in their writings and copying is a major strategy used by both l1 and l2 writers. in our country a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان 1392

in the area of vocabulary teaching and learning although much research has been done, only some of it has led to effective techniques of vocabulary teaching and many language learners still have problem learning vocabulary. the urge behind this study was to investigate three methods of teaching words. the first one was teaching words in context based on a traditional method of teaching that is,...

2011
Neera Batra Manpreet Singh P. Kumar L. Kumar R. K. Chauhan

In this paper, we present an optimal-bandwidth, min-process coordinated check pointing algorithm suitable for network failure prone applications in distributed systems. In the developed algorithm, during normal computation message transmission, dependency information among clusters is recorded in the corresponding cluster head processes. When a check pointing procedure begins, the initiator fro...

2012
Matthias Lendholt Martin Hammitzsch

The delivery of user-tailored warning messages for heterogeneous user groups is a challenge rarely covered by hazard monitoring and Early Warning Systems (EWS) even though it is one of the four key elements of early warning systems identified by the United Nations International Strategy for Disaster Reduction (UN/ISDR). This article describes the concepts of generic information logistics develo...

2011
R. K. Pateriya Shreeja Vasudevan

In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logic...

2002
Seungjoon Lee Bohyung Han Minho Shin

A wireless ad hoc network is a collection of mobile nodes with no fixed infrastructure. The absence of central authorization facility in dynamic and distributed environment requires collaboration among nodes. When a source searches for a route to a destination, an intermediate node can reply with its cached entry. To strengthen correctness of such routing discovery process, we propose a method ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید