نتایج جستجو برای: hoc networks

تعداد نتایج: 460314  

2017
Subhankar Ghosh Anuradha Banerjee

Design of a suitable routing protocol is difficult for mobile ad hoc networks due to its inherent dynamism and frequent topology change. Multicasting is even more complex because it requires transmission of an information to various destinations at approximately same time, if possible. Active research work in this field has resulted in a variety of proposals based on tree or mesh structures. Th...

2012
Swathi Agarwal

Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of indepth protection for wired networks. However, relatively little r...

2009
Prashant Kumar Naveen Chauhan

Caching of frequently accessed data in ad hoc networks is a potential technique that can improve the data access, performance and availability. A cooperative cache-based data access framework lets mobile node cache the data or the path to the data to reduce query delays and improve data accessibility. Due to mobility and resource constraints of ad hoc networks, cooperative caching techniques de...

2013
Wei Ding Alban Moreau

With the encouragement from success of P2P systems in real world application, recently we have seen active research on synergy of P2P systems and mobile ad hoc networks. The paper proposes a solution for mobility disturbance problem in initialization of ring-based P2P systems over ad hoc networks. It is a decentralized ring construction protocol in presence of mobility. A Mobile Ring Ad-hoc Net...

2006
Kristoffer Karlsson

This paper intends to give an introduction to ad hoc networks in general. The following topics will be discussed: The definition of ad hoc networks and its applications, moreover the paper dives a bit deeper into how routing is handled in ad hoc networks and describes a couple of different routing methods. The paper discusses routing methods from two different perspectives position based and ad...

2007
Shushan Zhao

This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. In this survey, we review all papers that are available in the literature on security schemes on mobile ad hoc networks using Identity-Based Cryptography during years 2001 to 2007. To introduce the topic, we first review most important developments on general Identity-Based Cryptography. The survey introdu...

Journal: :environmental health engineering and management 0
mohammad fahiminia environmental health engineering, research center for environmental pollutants, qom university of medical sciences, qom, iran hossein jafari mansoorian environmental health engineering research center, department of environmental health, kerman university of medical sciences, kerman, iran mohsen ansari environmental health engineering, school of public health, qom university of medical sciences, qom, iran ali saifour mofrad environmental health engineering, school of public health, qom university of medical sciences, qom, iran gharib majidi environmental health engineering, school of public health, qom university of medical sciences, qom, iran reza ansari tadi environmental health engineering, urban water & wastewater company of qom province, qom, iran

background: this study aimed to evaluated trends for iron and manganese concentrations in wells, reservoirs, and water distribution networks in qom city during the summer of 2012. methods: this was a cross-sectional study. the studied scopes consisted of groundwater (60 wells), reservoirs (10 tanks), and water distribution network (33 points). one sample was taken from each source monthly. stat...

2004
Stephan Eichler

Over the next couple of years the use of ad hoc networks especially for telematics applications will increase a lot to provide new types of services to passengers within the vehicle. Since the ad hoc environment is very vulnerable to a multitude of different attacks, new methods of securing these network environments have to be developed. In this paper the vulnerabilities of ad hoc networks are...

2010
G.Vijaya Kumar

Mobile ad hoc networks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence, routing paths in mobile ad hoc...

2007
E. Ahvar M. Fathy

Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), location-aided routing (LAR1).Our evaluation is based on energy consumption ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید