نتایج جستجو برای: routing holes
تعداد نتایج: 91348 فیلتر نتایج به سال:
In wireless sensor networks (WSNs), efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gatew...
The next generation protocol (Ipv6) also called Iping, which should replace the current generation of Internet protocol (Ipv4), brings many enhancements over Ipv4. Ipv4 has been a great success for more than 20 years, since its interception in 1980 but due to limited address space, complex configuration and very important lack of security it does not fulfil the requirement of the exponentially ...
-MANET capabilities are expected to be an overall driving force for next-generation wireless functionalities. These multihop networks the burden of routing packets from source to destination. Each Node handles part of the management of the network. Fault detection is extremely difficult because of the distributed design. In this paper we propose a novel scalable protocol which has virtual archi...
Routing in networks is a fundamental problem that occurred in the 1980’s and was well studied since then. However, there are still open problems, which have not been solved until now. In this thesis we propose routing schemes for special graph classes. Let G = (V,E) be a weighted network or graph. For any two nodes p, q ∈ V I would like to be able to route a data package from p to q. A routing ...
This paper presents four algorithms for QoSensing (4TQS) and routing on dynamics Wireless Sensor Networks. Since many types of researches held improvement in terms coverage connectivity enhancement. In a WSN with density 120 static 30 mobile nodes, the major power-consuming activities are mobility communication. Such power constraint has great effect node same network. We analyzed occurrence ho...
Interest in underwater acoustic sensor networks (UW-ASNs) has rapidly increased with the desire to control the large portion of the world covered by oceans. Energy efficiency is one of the major concerns in UW-ASNs due to the limited energy budget of the underwater sensor nodes. In this paper, we tackle the problem of energy holes in UW-ASNs while taking into consideration the unique characteri...
Alliance Network, Information Technology, and Firm Innovation: Findings from Pharmaceutical Industry
This study draws on absorptive capacity theory and organizational learning perspective to examine and elaborate the roles of IT in influencing firm innovation in the alliance network context of pharmaceutical industry. We focused on three types of IT-enabled knowledge capabilities and one specific type of alliance network structure structural holes and examine whether and how they interact to j...
mobile-ad-hoc-networks (manets) are self-configuring networks of mobile nodes, which communicate through wireless links. the infrastructure of a mobile ad hoc network (manet) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. the main issues in manets include the mobility of the network nodes, the scarcity of computati...
Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromisednode and denial-of-service is two key attacks. In this paper, we present four “Multi-path randomized routing Algorithm” a method to send the data multiple ways to classify the data in to normal and attacks in wireless senso...
MANETs are accessible to various attacks [1]. Black hole attack is one kind of routing disturbing attacks [13] and can destroy a MANET partially or totally. In this paper Fuzzy Logic techniques have been used to detect black hole attacks and find out secure routing in wireless ad hoc networks. The proposed heuristic successfully detects the black hole in the network and this information is pass...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید