نتایج جستجو برای: wireless network
تعداد نتایج: 731541 فیلتر نتایج به سال:
----
The mobile sink can increase the efficiency of wireless sensor networks. It moves in a monitored environment and collects the network nodes information. Thus, by the sink we can balance the power consumption and increases the network lifetime. Determining path of the sink's movement is usually modeled as an optimization problem where finding optimal solutions require collecting value of all the...
designing wireless sensor networks should meet appropriate parameters such as quality of service (qos) defined by different users. the variable physical conditions of the environment, processing and transmission power limitations and limited communication capabilities are the most important obstacles that influence qos parameters such as throughput, delay, reliability and network lifetime. the ...
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
چکیده ندارد.
Today, information networks play an important role in supply chain management. Therefore, in this article, clustering-based routing protocols, which are one of the most important ways to reduce energy consumption in wireless sensor networks, are used to optimize the supply chain informational cloud network. Accordingly, first, a clustering protocol is presented using self-organizing map neu...
Transmission opportunity limit and contention window are two influenced parameters in accessing the media in the networks based IEEE 802.11e standard. In these networks, every wireless station by setting of its contention window value, determines the chance of access to wireless media. Furthermore, a transmission opportunity limit provides a period of transmission without contact for a station....
sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید