نتایج جستجو برای: شبکه های ad hoc
تعداد نتایج: 586806 فیلتر نتایج به سال:
در این پروژه الگوریتم جدیدی پیشنهاد شده است که هدف آن کاهش نرخ تصادم در شبکه های ad hoc می باشد. زیاد بودن نرخ تصادم، منجر به افزایش تأخیر در دریافت داده و یا نرسیدن داده به مقصد می گردد. بعلاوه موجب افزایش ارسال های مجدد و در نتیجه کاهش توان فرستنده ها می گردد. روش دسترسی به کانال ارائه شده در ieee 802.11 در مد dcf ، به طور کامل نتوانسته است مشکلات گره های پنهان را بر طرف نماید. الگوریتم جدید ...
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
OBJECTIVES Our aim was to compare longer-term outcomes for ad hoc percutaneous coronary intervention (PCI) and non-ad hoc PCI. BACKGROUND Ad hoc PCIs, whereby PCI is performed immediately after cardiac catheterization, has become the most common way of performing PCI. However, no studies have compared longer-term outcomes for ad hoc and non-ad hoc PCIs. METHODS A total of 46,565 New York St...
in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
this paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (espar). the proposed method is capable of providing better capacity compared to the conventional espar. the termination of each antenna element in this structure comprises a pin diode in addition to a varactor. using pin diode besides the varactor provides more degrees of freed...
in this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (aodv) routing protocol is proposed. in the method, the required features for describing the normal behavior of aodv are defined via step by step analysis of aodv and independent of any attack. in order to learn the normal behavior of aodv, a fuzzy averaging method is used fo...
content discovery is one of the fundamental issues that determines the architecture and performance of content distribution networks based on peer-to-peer (p2p) networks. to administrate the costs and discoveries, peers of a p2p network communicate with each other by one or more overlay layers. the condition of node’s relations in overlay networks, have a great impact in efficiency of networks....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید