International Journal of Computer Science and Information Technology
نویسندگان
چکیده
We take some parts of a theoretical mobility model in two-dimension grid proposed by Greenlaw and Kantabutra to be our model. The has eight necessary factors that we commonly use mobile wireless network: sources or signal providers, the directions source can move, users devices, given which define user's movement, source's velocity, coverage, obstacles. However, include only sources, obstacles Square Grid Points Coverage (SGPC) problem minimize number with coverage radius one cover square point size p restriction all must communicable proof SGPC is NP-complete class. also give an Approx-Square-Grid-Coverage (ASGC) algorithm compute approximate solution SGPC. ASGC uses rule any obtained from addition 3, 4 5 then combines 3-gadgets, 4-gadgets 5-gadgets specify position p. find achieves approximation ratio . Moreover, state about extension usage show examples. if on moved, area under covered eight-time-steps movement. prove extend 1.59, without movement gird will covered. Further studies are discussed list tentative problems conclusion.
منابع مشابه
(IJCSIS) International Journal of Computer Science and Information Security,
Biometric recognition systems have advanced significantly in the last decade and their use in specific applications will increase in the near future. The ability to conduct meaningful comparisons and assessments will be crucial to successful deployment and increasing biometric adoption. The best modality used as unimodal biometric systems are unable to fully address the problem of higher recogn...
متن کاملInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology
Load Balancing is the challenging tasks in the Computing infrastructure. These two tasks are interdependent. Well defined computing infrastructure may reach through a Blue Print is called GRID. Even advance Resource Management algorithms may suffer due to improper load distribution among the available resources in the Grid environment. Load balancing algorithm plays important role in the resour...
متن کاملInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology
Privacy and Security are major issue occur in IoT network. The main objective of the project was to eliminate the eavesdropper collusion occurred by the two or more devices communicating via optimal relay with centralized router using IOT network. To overall delay is reduced with increase in throughput. The security and privacy are some of the major issues that prevent the wide adoption of Inte...
متن کاملInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology
With the advancement in the technology the jobs for the human kind is becoming more and more tedious with millions and trillions of documents waiting to be processed. Certainly, such a daunting tasks are next to impossible to be completed manually. Over a period, the things are getting automatically done with the robots or intelligent computer systems. Optical character recognition is one of su...
متن کاملInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology
An intrusion detection system is software that monitors a single or a network of computers for malicious activities that are aimed at stealing or censoring information or corrupting network protocols. Most technique used in today’s intrusion detection system are not able to deal with the dynamic and complex nature of cyber-attacks on computer networks. Even though efficient adaptive methods lik...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Science and Information Technology
سال: 2023
ISSN: ['0975-4660', '0975-3826']
DOI: https://doi.org/10.5121/ijcsit