نتایج جستجو برای: after receiving this alerting message
تعداد نتایج: 6974929 فیلتر نتایج به سال:
—A Delay Tolerant Network (DTN) is mostly suitable where there is intermittent connection between communicating nodes such as mobile wireless ad hoc network nodes. In general, a message sending node in a DTN copies the message and transmits it to nodes which it encounters. A receiving node, if it is not the destination of the message, stores the message and transmits a copy of the message to n...
BACKGROUND The Worthing physiological scoring system (PSS) was first validated in 2005 as a tool to predict hospital mortality on admission and was subsequently introduced into clinical practice at Worthing Hospital, UK. Five years on, this study was conducted to determine the effects on mortality and length of stay (LOS) after the introduction of electronic alerting software using the PSS. In ...
the purpose of this study was to examine the comparative effect of story retelling and role playing on efl learners’ vocabulary learning and reading comprehension. to carry out the purpose of the study 90 female learners of tabarestan language school located in noshahr were non-randomly selected. they took pet test and among these 90 participants 62 students were selected as homogenous learners...
this study was an attempt to investigate the effect of subtitling on vocabulary learning among iranian intermediate students. to find the homogeneity of the groups, tofel test was administered to student in kish mehr institute in garmsar. after analyzing the data, 60 participants (female students) who scored within the range of one standard deviation above and below the mean, were selected as h...
Inherent resource limitation nature of wireless sensor networks poses unique security challenges. Cryptography is not enough and efficient to secure wireless sensor networks; it can not prevent malicious nodes and tunneling of messages to wormholes and sinkholes. In this paper we propose a monitoring mechanism to detect malicious nodes; the proposed mechanism is protected with a secure triple k...
Maintaining the distribution power substation's health and reliability has been an issue for many years. A typical transformer measurement device detects only one characteristic, such as power, current, voltage, or phase. While some methods can detect several factors, acquisition time operation parameters are too long, testing speed is insufficient. However, a monitoring system that check tempe...
The U.S. Department of Homeland Security initiated the Commercial Mobile Alert System (CMAS) to inform the general public of emergencies. CMAS utilizes the commercial telecommunications infrastructure to broadcast emergency alert text messages to mobile users in an area affected by an emergency. Because CMAS uses cell broadcast service, the smallest area that CMAS can broadcast messages is a ce...
Emergency management is by its nature, and in some jurisdictions by its definition, an activity that requires a concerted effort by a number of governmental and non-governmental agencies. There is a growing appreciation that collaboration between these parties is best served through the use of interoperable standards for message formats for purposes such as alerting and resource exchange. Howev...
A n important aspect of designing a distributed application is the communication model you use to connect its various components. Some middleware solutions, 1 such as Web services, 2 offer two of the most important communication paradigms: asynchronous messaging and remote procedure call (RPC). Message-oriented middleware (MOM) lets a ser-vice's consumers physically and temporally decou-ple fro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید