نتایج جستجو برای: overhearing

تعداد نتایج: 302  

Journal: :Annals of emerging technologies in computing. 2021

The security issue is one of the main problems in Wireless Sensor Network (WSN) and Internet Things (IoTs). RPL (Routing protocol for low power lossy networks) a standard routing WSN, not to be missed from being attacks. performance reduced significantly after attacked. Sinkhole attack most common attacks WSN RPL, threatening network capability by discarding packets disrupting paths. Therefore,...

Journal: :IEEE Transactions on Communications 2022

This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules number of sensors to upload their sensed data subject overhearing distributed eavesdroppers. We propose an uncoordinated jamming scheme which those unscheduled send signals certain probability defeat With aid stochastic geometry theory and...

Journal: :Computer Communications 2007
Wei Kuang Lai Sheng-Yu Hsiao Yuh-Chung Lin

The network topology changes frequently in ad-hoc networks. Some on-demand protocols with multi-paths or backup routes have been proposed to improve the performance in ad-hoc networks. AODV-BR scheme improves AODV routing protocols by constructing a mesh structure and providing multiple alternate routes. The algorithm establishes the mesh and multi-path using the RREP of AODV, which does not tr...

2005
Rei-Heng Cheng Chun-Hung Kuo Hsuan Chuang

AODV is a famous routing protocol for mobile ad hoc networks. The routing path will not change during data transmission unless a link failure occurs. For the mobile nodes in an ad hoc network may move arbitrarily, some nodes in the routing path may turn to be redundant. On the other hand, when a link between nodes is tending to be broken, the nodes in the middle way of the link are turn to be v...

2007
Jinhun Bae Kitae Kim Keonwook Kim

Sensor nodes in large-scale sensor networks autonomously and proactively report diverse information obtained from extensive target area to a base station, which is energy unconstrained node. To efficiently handle the variable traffic, we present Co-MAC, an energy efficient medium access control protocol for large-scale sensor networks. In Co-MAC, an overall network is divided into independent s...

Journal: :Journal of memory and language 2008
Terry Kit-Fong Au Janet S Oh Leah M Knightly Sun-Ah Jun Laura F Romo

Childhood experience with a language seems to help adult learners speak it with a more native-like accent. Can analogous benefits be found beyond phonology? This study focused on adult learners of Spanish who had spoken Spanish as their native language before age 7 and only minimally, if at all, thereafter until they began to re-learn Spanish around age 14 years. They were compared with native ...

2006
YE MING HUA

In IEEE 802.11 Power Saving (PS) mode specified for Independent Basic Service Set (IBSS), mobile stations announce their pending data packets within Announcement Traffic Indication Message (ATIM) window immediately after the reception of Time Synchronization Function (TSF) beacon. This paper proposed modifications to the PS mode by transmitting the TSF beacon at the end of each ATIM window. Upo...

Journal: :British journal of anaesthesia 1973
A M Barr R M Wong

Two hundred patients were interviewed before and after elective bronchoscopy or laryngoscopy. Premedication consisted of pethidine together with either atropine or hyoscine. Anaesthetic drugs were restricted to thiopentone and suxamethonium. Eight patients (4%) described some degree of awareness. No statistically significant correlation with awareness was demonstrated for the premedication, the...

2013
Nourhene Maalel Pierre Roux Mounir Kellil Abdelmadjid Bouabdallah

Many Wireless Sensor Networks (WSN) applications success is contingent upon the reliable delivery of high-priority events from many scattered sensors to one or more sink nodes. In particular, WSN has to be self-adaptive and resilient to errors by providing efficient mechanisms for information distribution especially in the multi-hop scenario. To meet the stringent requirement of reliably transm...

Journal: :Journal of child language 2011
Carmen Martínez-Sussmann Nameera Akhtar Gil Diesendruck Lori Markson

Children as young as two years of age are able to learn novel object labels through overhearing, even when distracted by an attractive toy (Akhtar, 2005). The present studies varied the information provided about novel objects and examined which elements (i.e. novel versus neutral information and labels versus facts) toddlers chose to monitor, and what type of information they were more likely ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید