نتایج جستجو برای: designing communication networks through constructing secure roads with halfway caravansarais in desert areas

تعداد نتایج: 18763358  

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

2003
Amitabha Bagchi Amitabh Chaudhary Michael T. Goodrich Shouhuai Xu

We propose a bandwidth-efficient algorithmic solution for perfectly-secure communication in the absence of secure infrastructure. Our solution involves connecting vertex pairs by a set of k edge-disjoint paths (a structure we call a k-system) where k is a parameter determined by the connectivity of the network. This structure is resilient to adversaries with bounded eavesdropping capability. To...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

growing demands and requires of high data rate systems cause significant increase of high frequency systems for wideband communication applications. as mixers are one of the main blocks of each receivers and its performance has great impact on receiver’s performance; in this thesis, a new solution for ku-band (12-18 ghz) mixer design in tsmc 0.18 µm is presented. this mixer has high linearity a...

Journal: :journal of rangeland science 2011
g.a. heshmati

there are more than 750 counties in 13 provinces and autonomous regionsconstituting 30% of china lands which are facing serious problem of desertification. theseareas are mainly distributed in arid, semi-arid and dry sub-humid areas in the western part ofnortheast china, north central china and most of northwest china. biological methods are theultimate way for drift sand stabilization and a fu...

2008
Jin-Hee Cho

Many mobile applications in wireless networks such as military battlefield, emergency response, mobile commerce, online gaming, and collaborative work are based on the notion of group communications. Designing security protocols for secure group communications in wireless networks faces many technical challenges due to unique characteristics of wireless networks including resource-constrained e...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده ادبیات، زبانهای خارجی و تاریخ 1391

the present study sought to examine whether a task-based approach could have an impact on raising awareness of collocations. moreover, it sought to investigate the facilitative role of consciousness-raising tasks of collocations in the communicative instances of use. to this end, 68 intermediate learners of english were selected via a placement test. the participants were taught with classroom ...

پایان نامه :0 1392

nowadays in trade and economic issues, prediction is proposed as the most important branch of science. existence of effective variables, caused various sectors of the economic and business executives to prefer having mechanisms which can be used in their decisions. in recent years, several advances have led to various challenges in the science of forecasting. economical managers in various fi...

2005
Ratan K. Guha Mainak Chatterjee Jaideep Sarkar

Secure communication in ad hoc networks is an inherent problem because of the distributiveness of the nodes and the reliance on cooperation between the nodes. All the nodes in such networks rely and trust other nodes for forwarding packets because of their limitation in the range of transmission. Due to the absence of any central administrative node, verification of authenticity of nodes is ver...

2007
Gene Tsudik

In this position paper, we address some current limitations and challenges as well as emerging directions in three related areas of secure communication: (1) security in Wireless Sensor Networks – WSNs, (2) security in Mobile Ad Hoc Networks – MANETs, and, (3) security in Cellular Phone Networks.

Journal: :Journal of computer applications in archaeology 2021

The Egyptian Eastern Desert, the part of Sahara Desert that connects Nile and Red Sea, is rich in natural resources meshed with multiple networks. adoption camel as main mode transportation 1st millennium BC, faster a greater load capacity than humans or donkeys, dramatically changed logistics used to cross this difficult terrain. Our objective, therefore, understand reconstruct circulation reg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید