نتایج جستجو برای: شبکه های ad hoc

تعداد نتایج: 586806  

Journal: :International Journal of Future Generation Communication and Networking 2016

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق و کامپیوتر 1391

در این پروژه الگوریتم جدیدی پیشنهاد شده است که هدف آن کاهش نرخ تصادم در شبکه های ad hoc می باشد. زیاد بودن نرخ تصادم، منجر به افزایش تأخیر در دریافت داده و یا نرسیدن داده به مقصد می گردد. بعلاوه موجب افزایش ارسال های مجدد و در نتیجه کاهش توان فرستنده ها می گردد. روش دسترسی به کانال ارائه شده در ieee 802.11 در مد dcf ، به طور کامل نتوانسته است مشکلات گره های پنهان را بر طرف نماید. الگوریتم جدید ...

P Panahi

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

Journal: :JACC. Cardiovascular interventions 2009
Edward L Hannan Zaza Samadashvili Gary Walford David R Holmes Alice Jacobs Samin Sharma Stanley Katz Spencer B King

OBJECTIVES Our aim was to compare longer-term outcomes for ad hoc percutaneous coronary intervention (PCI) and non-ad hoc PCI. BACKGROUND Ad hoc PCIs, whereby PCI is performed immediately after cardiac catheterization, has become the most common way of performing PCI. However, no studies have compared longer-term outcomes for ad hoc and non-ad hoc PCIs. METHODS A total of 46,565 New York St...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

Journal: :amirkabir international journal of electrical & electronics engineering 2013
a. anbaran a. mohammadi a. abdipour

this paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (espar). the proposed method is capable of providing better capacity compared to the conventional espar. the termination of each antenna element in this structure comprises a pin diode in addition to a varactor. using pin diode besides the varactor provides more degrees of freed...

Journal: :iranian journal of fuzzy systems 2013
mohammad rahmanimanesh saeed jalili

in this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (aodv) routing protocol is proposed. in the method, the required features for describing the normal behavior of aodv are defined via step by step analysis of aodv and independent of any attack. in order to learn the normal behavior of aodv, a fuzzy averaging method is used fo...

Journal: :journal of advances in computer research 2016
mona mojtabaee morteza romoozi hamideh babaei

content discovery is one of the fundamental issues that determines the architecture and performance of content distribution networks based on peer-to-peer (p2p) networks. to administrate the costs and discoveries, peers of a p2p network communicate with each other by one or more overlay layers. the condition of node’s relations in overlay networks, have a great impact in efficiency of networks....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید