نتایج جستجو برای: source sink
تعداد نتایج: 427961 فیلتر نتایج به سال:
Protecting the location privacy of source and sink nodes in a sensor network is an important problem. Source-location privacy is to prevent event source tracking by adversaries and sink-location privacy is to protect sink nodes from adversaries who try to disrupt the sensor network. In this paper, we propose a constant-rate broadcast scheme for ensuring their location privacy. This scheme (1) e...
1.1 Max-flow min-cut A flow network is a directed graph D = (V,E) with two distinguished vertices s and t called the source and the sink, respectively. Moreover, each arc (u, v) ∈ E has a certain capacity c(u, v) ≥ 0 assigned to it. Let X be a proper non-empty subset of V . Let X̄ := V −X , then the pair (X, X̄) forms a partition of V , called a cut of D. The set of arcs of D going from X to X̄ is...
A k-disjoint path cover of a graph is a set of k internally vertex-disjoint paths which cover the vertex set with k paths and each of which runs between a source and a sink. Given that each source and sink v is associated with an integer-valued demand d(v) ≥ 1, we are concerned with general-demand k-disjoint path cover in which every source and sink v is contained in the d(v) paths. In this pap...
In most plant species, amino acids are the predominant chemical forms in which nitrogen is transported. However, in nodulated tropical or subtropical legumes, ureides are the main nitrogen transport compounds. This review describes the partitioning of amino acids and ureides within the plant, and follows their movement from the location of synthesis (source) to the sites of usage (sink). Xylem ...
The deliberation of interloper is to interrupt the communication or to invade the location of sender and receiver. One of the primary concerns of wireless sensor networks is the privacy of sender and receiver. There is always a threat of eavesdropper. The chief objective of this paper is to achieve a high degree of security for both source and sink. Due to an open characteristic of wireless sen...
The insecure atmospheres makes easy for an adversary to eavesdrop the network in a wireless sensor network. An eclectic collection of protocols are available for providing content privacy but the contextual information remains unprotected. So an adversary can use this contextual information to carry out attack on source node or the sink node in sensor network. The current approaches for locatio...
In order to support the sink mobility of conventional routing protocols, we propose a simple route maintaining algorithm which does not use the flooding method. In the proposed method, when the sink loses the connection with the source, it does not rebuild an entire route but simply repairs the existing route based on local information. Experimental results show that the proposed algorithm dras...
A multi-source multi-sink stochastic-flow network consists of a set of nodes, including sources nodes si that supply resources and sink nodes tj where demands are realized, and a set of directed arcs that carry resource flows. This paper presents an algorithm to determine the probability, called system reliability ( T C d ij wj R ), that for each source–sink pair (si, tj), dwj (the demand for r...
Future changes of pan-Arctic land–atmospheric methane (CH4) and carbon dioxide (CO2) depend on how terrestrial ecosystems respond to warming climate. Here, we used a coupled hydrology–biogeochemistry model to make our estimates of these carbon exchanges with two contrasting climate change scenarios (no-policy versus policy) over the 21st century, by considering (1) a detailed water table dynami...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید