نتایج جستجو برای: hybrid node

تعداد نتایج: 357973  

2016
S. Ni Y. Tseng Y. Chen H. Liu P. Wan X. Jia X. Liu

Among Many fundamental communication primitives in wireless ad hoc network, flooding in wireless ad hoc network reduces the number of transmission in network and it plays a significant role in which every node transmits the message after receiving it for the first time. To successfully reducing the number of transmissions of broadcast that are required to achieve full delivery and constant appr...

2016
Mustafa Shakir Obaid ur Rehman Mudassir Rahim Nabil Ali Alrajeh Zahoor Ali Khan Mahmood Ashraf Khan Iftikhar Azim Niaz Nadeem Javaid

Due to the recent development in the field of Wireless Sensor Networks (WSNs), the Wireless Body Area Networks (WBANs) have become a major area of interest for the developers and researchers. Human body exhibits postural mobility due to which distance variation occurs and the status of connections amongst sensors change time to time. One of the major requirements of WBAN is to prolong the netwo...

2014
Pavan Kumar

Servers maintain firewall log data of in and out traffic for Intrusion Detection and prevention mechanisms .Even though various approaches available to detect and prevent unauthorized user or access, they are not optimal. In this paper we are proposing a hybrid approach of Classification and Signature mechanism. Classification analyzes behavior of node and signature mechanism maintains authenti...

2014
Vikram Raju Kumkum Garg

A Mobile Node (MN) has to intimate to the Home Agent (HA) about its location to Correspondent Node (CN), using a Binding Update (BU) between HA and MN. During this exchange; an intruder may enter easily because of security lapses. Hence, a security mechanism is required to protect the BU. A new security system using hybrid cryptosystem is proposed for Binding Update (BU) in MIPv6.

2014
Julia Greene Erika Schneble Jonathan Martin Maddie Flores Alfred Trappey John Berry Timothy Vreeland Diane Hale Guy Clifton Sonia A Perez Michael Papamichail George Peoples Elizabeth Mittendorf Sathibalan Ponniah

Background We are conducting a Phase II clinical trial of the HER2 peptide vaccine AE37+GM-CSF for prevention of breast cancer recurrence in disease-free, node-positive or highrisk node-negative patients, who have completed standard of care therapy. AE37, an Ii-Key hybrid of the HER2/neu derived peptide AE36 (aa:776-790), is an MHC Class II epitope capable of stimulating CD4 helper T cells. Her...

2010
Alex Aussem André Tchernof Sérgio Rodrigues de Morais Sophie Rome

We discuss, in more details, our algorithm called Recursive Hybrid Parents and Children (RHPC). RHPC takes a data set as input and returns a partially oriented DAG (PDAG for short) representative of a bayesian network equivalence class. The latter is obtained by directing the compelled edges of the skeleton. The skeleton is obtained by running an algorithm called Hybrid Parents and Children (HP...

2005
Fan Wu Tongqing Qiu YueQuan Chen Guihai Chen

High availability in peer-to-peer DHTs requires data redundancy. This paper takes user download behavior into account to evaluate redundancy schemes in data storage and share systems. Furthermore, we propose a hybrid redundancy scheme of replication and erasure coding. Experiment results show that replication scheme saves more bandwidth than erasure coding scheme, although it requires more stor...

Journal: :journal of advances in computer engineering and technology 0
mehran pourmohammad abdollahi university of tabriz javad musevi niya university of tabriz payman mahmoudi biroun university of tabriz

designing wireless sensor networks should meet appropriate parameters such as quality of service (qos) defined by different users. the variable physical conditions of the environment, processing and transmission power limitations and limited communication capabilities are the most important obstacles that influence qos parameters such as throughput, delay, reliability and network lifetime. the ...

2011
Paul S. Rosenbloom

Can mental imagery be incorporated uniformly into a cognitive architecture by leveraging the mixed (relational and probabilistic) hybrid (discrete and continuous) processing supported by factor graphs? This article takes an initial step towards answering this question via an implementation in a graphical cognitive architecture of a version of the Eight Puzzle based on a hybrid function represen...

2009
Piotr Bródka Katarzyna Musial Przemyslaw Kazienko

Social network analysis offers many measures, which are successfully utilized to describe the social network profile. One of them is node position, useful to assess the importance of a given node within both the whole network and its smaller subgroups. However, to analyze large social networks a lot of effort and resources are necessary. In this paper, some algorithms that can be utilized in th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید