نتایج جستجو برای: routing holes

تعداد نتایج: 91348  

2011
Hua Jonathan Ye Atreyi Kankanhalli

Innovation has been a topic of considerable interest to researchers and practitioners. Particularly, the networks within which firms operate and their properties (e.g., structural holes) are suggested to affect firms’ innovation performance. One stream of research finds that structural holes are conducive to firms’ innovation because of the heterogeneous information about alternatives that firm...

2015
K. Rajasekaran Kannan Balasubramanian

A sensory network consists of multiple detection locations called sensor nodes, each of which is tiny, featherweight and portable. A single path routing protocols in wireless sensor network can lead to holes in the network, since only the nodes present in the single path is used for the data transmission. Apart from the advantages like reduced computation, complexity and resource utilization, t...

2017
Nadeem Javaid Muhammad Arshad Sher Wadood Abdul Iftikhar Azim Niaz Ahmad Almogren Atif Alamri

In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy ...

2016
P. SELVAM Mr. KANNAN

Energy consumption and security has become a primary concern in a Wireless Sensor Network. In multi-hop communications, nodes that are near a sink tend to become congested as they are responsible for forwarding data from nodes that are farther away. Thus, the closer a sensor node is to a sink, the faster its battery runs out, whereas those farther away may maintain more energy. This leads to no...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

2011
Myounggyu Won Radu Stoleru

Geographic routing is well suited for point-to-point communication in large-scale wireless sensor networks, because it is a stateless protocol that is, the per-node state is independent of network size. However, the local minimum caused mainly by network holes makes the path stretch increase by up to O(c), where c is the optimal path length. Recently, Tan et. al. proposed a visibility graph-bas...

2015
Bassel Arafeh Khaled Day Abderezak Touzene Nasser Alzeidi

This work proposes an efficient disjoint multipath geographic routing algorithm for dense wireless sensor networks (WSN), called Multipath Grid-based Enabled Geographic Routing (MGEGR). The proposed algorithm relies on the construction of a 2-D logical grid in the geographical region of deployment. The objective of the proposed scheme is to determine optimal or near-optimal (within a defined co...

2013
S. Ganesh

This paper addresses the problem of reliable data distribution in dynamic large scale mobile ad-hoc network, for which existing routing protocols are not suitable. An efficient Position-based Opportunistic Routing (POR) protocol is good in delivering the data in highly dynamic MANETs. But it is affected by the over heading problem and moreover there are no data confidentiality and data security...

2013
Geetha V Deepika Singh

This paper proposes a simple path diversity algorithm (SPDA) for Inter domain routing. The SPDA uses source routing to find an alternate path from a source to a destination, and allows flexible division of traffic over the best and alternate path. The SPDA comprises three steps. First, the BGP protocol is extended to allow the BGP routing table to save the multiple paths for any destination. Se...

2011
Samir MEDJIAH Toufik AHMED Abolghasem ASGARI

Wireless Multimedia Sensor Networks (WMSNs) are generally used for surveillance applications, intrusion detection, environmental and building monitoring, etc. Routing has become an important challenge to WMSNs from the standpoint of supporting multimedia applications due to the constraints on energy and computational capabilities of sensor nodes, and acquiring of the global network knowledge fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید