نتایج جستجو برای: speed of nodes

تعداد نتایج: 21179327  

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

ژورنال: محاسبات نرم 2013

To increase reliability and fault tolerance in wireless sensor network, using spare nodes is a useful method. In this article, we survey the influence of using single-type and multi-type spare nodes on the fault tolerance in the low density. To achieve this, we use single-type and multi-type spare nodes and construct the network reliability graph for one, two and three-node densities. Then, we ...

2014
Priyanka Sharma Abhay Bindal

Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructureless network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network. These colluding nodes create an illusi...

1999
Tim H. Hultberg

This guide is intended to help users get started using the IBM SP distributed memory parallel processor, JENSEN, at UNI C for writing parallel programs. Since the last upgrade in January 1999 the system has a total of 100 processors, called nodes, each with its own local memory. Four of these nodes are for interactive use, 12 belong to a pool for parallel test jobs, 64 are reserved for parallel...

Journal: :international journal of hematology-oncology and stem cell research 0
shahrbanou keyhanian hematology-oncology department, school of medicine, islamic azad university, tonekabon, mazandaran, iran mm saravi radiology department, imam sajjad hospital, ramsar, mazandaran, iran h yusefi school of medicine, islamic azad university, tonekabon, mazandaran, iran z fotokian school of nursing and midwifery, ramsar, babol medical sciences university, mazandaran, iran

castleman disease (cd) is a rare, lymphoproliferative disorder of uncertain etiology. we are reporting on two cases of castleman disease. both patients were female. this disease can be found wherever lymph nodes are present. we have reported two unusual cases of castleman disease. a 29- year old woman was referred for evaluation because of a cervical lymph node, weight loss and night sweats. th...

2012
Mukesh Chand

A mobile ad hoc network is a collection of mobile nodes in which a pair of nodes communicates by sending messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. Only pairs of nodes that lie within one another's transmission radius can directly communicate with each other. Wireless link failures occur when previously communicati...

Journal: :journal of computer and robotics 0
samaneh assar faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran behrooz masoumi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

multi agent markov decision processes (mmdps), as the generalization of markov decision processes to the multi agent case, have long been used for modeling multi agent system and are used as a suitable framework for multi agent reinforcement learning. in this paper, a generalized learning automata based algorithm for finding optimal policies in mmdp is proposed. in the proposed algorithm, mmdp ...

2017
Amol R. Dhakne Prashant N. Chatur

In wireless sensor network, traditional security mechanisms such as cryptographic methods need a large consumption of resources such as memory, speed, and communication bandwidth. And by using such techniques it is not possible to detect malicious, faulty and selfish nodes that harm to network. Alternatively, trust methods calculate trust of sensor nodes and thereby help to detect malicious, se...

Journal: :JNW 2012
Dandan Han Jing Zhang

For nodes’ mobility in mobile P2P networks and the consistency of overlay network, an unstructured Modified Gnutella-like P2P protocol (M-GIA) is proposed in this paper. The advantage of GIA protocol is presented fully, while the physical location information of nodes and the distance between nodes as parameters are added into the GIA protocol. The distance between two nodes can decide logical ...

2015
Taho Dorta Mireya Zapata Jordi Madrenas Giovanny Sánchez

Given the massive number of interconnects in Spiking Neural Networks (SNNs), distributing spikes effciently becomes a critical issue for the efficient hardware emulation of large-scale SNNs. In this work, the AER-SRT (Address Event Representation over Synchronous Serial Ring Topology) architecture for spike transmission is proposed. AER-SRT is a light, easily scalable, packet-based solution imp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید