نتایج جستجو برای: after receiving this alerting message

تعداد نتایج: 6974929  

Journal: :JCM 2017
Bhed Bahadur Bista Danda B. Rawat

—A Delay Tolerant Network (DTN) is mostly suitable where there is intermittent connection between communicating nodes such as mobile wireless ad hoc network nodes. In general, a message sending node in a DTN copies the message and transmits it to nodes which it encounters. A receiving node, if it is not the destination of the message, stores the message and transmits a copy of the message to n...

Journal: :British journal of anaesthesia 2014
G B Smith D R Prytherch P E Schmidt P Meredith D Watson V Watson R M Killen P Greengross M A Mohammed

BACKGROUND The Worthing physiological scoring system (PSS) was first validated in 2005 as a tool to predict hospital mortality on admission and was subsequently introduced into clinical practice at Worthing Hospital, UK. Five years on, this study was conducted to determine the effects on mortality and length of stay (LOS) after the introduction of electronic alerting software using the PSS. In ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1393

the purpose of this study was to examine the comparative effect of story retelling and role playing on efl learners’ vocabulary learning and reading comprehension. to carry out the purpose of the study 90 female learners of tabarestan language school located in noshahr were non-randomly selected. they took pet test and among these 90 participants 62 students were selected as homogenous learners...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده علوم انسانی 1390

this study was an attempt to investigate the effect of subtitling on vocabulary learning among iranian intermediate students. to find the homogeneity of the groups, tofel test was administered to student in kish mehr institute in garmsar. after analyzing the data, 60 participants (female students) who scored within the range of one standard deviation above and below the mean, were selected as h...

2006
Tanveer Zia Albert Zomaya

Inherent resource limitation nature of wireless sensor networks poses unique security challenges. Cryptography is not enough and efficient to secure wireless sensor networks; it can not prevent malicious nodes and tunneling of messages to wormholes and sinkholes. In this paper we propose a monitoring mechanism to detect malicious nodes; the proposed mechanism is protected with a secure triple k...

Journal: :European Journal of Engineering and Technology Research 2022

Maintaining the distribution power substation's health and reliability has been an issue for many years. A typical transformer measurement device detects only one characteristic, such as power, current, voltage, or phase. While some methods can detect several factors, acquisition time operation parameters are too long, testing speed is insufficient. However, a monitoring system that check tempe...

2011
Paul Ngo Duminda Wijesekera

The U.S. Department of Homeland Security initiated the Commercial Mobile Alert System (CMAS) to inform the general public of emergencies. CMAS utilizes the commercial telecommunications infrastructure to broadcast emergency alert text messages to mobile users in an area affected by an emergency. Because CMAS uses cell broadcast service, the smallest area that CMAS can broadcast messages is a ce...

2008
Jim Steel Renato Iannella

Emergency management is by its nature, and in some jurisdictions by its definition, an activity that requires a concerted effort by a number of governmental and non-governmental agencies. There is a growing appreciation that collaboration between these parties is best served through the use of interoperable standards for message formats for purposes such as alerting and resource exchange. Howev...

Journal: :IEEE Internet Computing 2005
Daniel A. Menascé

A n important aspect of designing a distributed application is the communication model you use to connect its various components. Some middleware solutions, 1 such as Web services, 2 offer two of the most important communication paradigms: asynchronous messaging and remote procedure call (RPC). Message-oriented middleware (MOM) lets a ser-vice's consumers physically and temporally decou-ple fro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید