نتایج جستجو برای: hybrid node
تعداد نتایج: 357973 فیلتر نتایج به سال:
Wireless mesh networks (WMNs) are wireless networks that are composed of mesh routers and mesh clients. Mesh routers have minimal mobility and form the backbone of WMNs. IEEE 802.11s-based WMNs have a default routing protocol, namely, a hybrid wireless mesh protocol (HWMP). In tree-based proactive mode, HWMP is completely centralized and constrained by the root node, which causes a bottleneck a...
Routing is the main part of wireless adhoc network conventionally there are two approaches first one is Proactive and another one is Reactive. Both these approaches have some substantial disadvantage and to overcome hybrid routing protocols designed. ZRP (Zone Routing Protocol) is one of the hybrid routing protocols, it takes advantage of proactive approach by providing reliability within the s...
Interference-Aware Hybrid MAC protocol for Cognitive Radio Ad-Hoc Networks with Directional Antennas
CR and PU hidden terminals in multi-channel Cognitive MAC protocols result in increased packet drops. This is due to inefficient node synchronization with existing “Control Channel” design. To date, In-band and Out-of-band CCC based MAC protocols are proposed to avoid PU and CR hidden terminals. But, In-band CCC based CR-MAC protocols cannot efficiently resolve the hidden terminal packet drops ...
Dynamic load balancing has become a necessity in emerging distributed environments to address the inherent heterogeneity in computing resources. The majority of traditional dynamic load balancing algorithms were developed assuming homogeneous set of nodes and suffer significant performance drop under variety of workloads. Moreover, the centralized dynamic approach limits the scalability with th...
Wireless sensor network (WSN) using network coding is vulnerable to pollution attacks. Existing authentication schemes addressing this attack either burden the sensor node with a higher computation overhead, or fail to provide an efficient way to mitigate two recently reported attacks: tag pollution attacks and repetitive attacks, which makes them inapplicable to WSN. This paper proposes an eff...
Present Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which leads to rapid depletion of a node’s battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS. The cluster leader election process uses the Vickrey– Clarke–Groves mechanism to elect the cluster leader which provides the intrusion d...
The propagation of traffic congestion along roads is a commonplace nonlinear phenomenon. When many roads are connected in a network, congestion can spill from one road to others as drivers queue to enter a congested road, creating further nonlinearities in the network dynamics. This paper considers the node model problem, which refers to methods for solving for cross-flows when roads meet at a ...
Grid Systems allow applications to assemble and use collections of resources on an as-needed basis, without regard to its physical location. Grid middleware and other software architecture that manage resources have to locate and allocate resources according to application requirements. They also have to manage other activities like authentication and process creation that are required to prepa...
Multiprocessors and high performance networks allow building CLUsters of MultiProcessors (CLUMPs). One distinctive feature over traditional parallel computers is their hybrid memory model (message passing between the nodes and shared memory inside the nodes). We evaluate the performance of a cluster of dual processor PCs connected by a Myrinet network for NAS benchmarks using two programming mo...
In wireless sensor network, determine the position of the node position or events is very important to its surveillance activities, however, in the traditional wireless sensor network, are using two-dimensional spatial positioning technology, aiming at this problem, this article will wireless sensor network (WSN) 2 d algorithm is extended to 3 d space, analyzes the main factors affecting the po...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید