نتایج جستجو برای: routing holes
تعداد نتایج: 91348 فیلتر نتایج به سال:
bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...
Routing is a challenging problem for wireless ad hoc networks, especially when the nodes are mobile and spread so widely that in most cases multiple hops are needed to route a message from one node to another. In fact, it is known that any online routing protocol has a poor performance in the worst case, in a sense that there is a distribution of nodes resulting in bad routing paths for that pr...
Coverage is a key and fundamental problem in wireless sensor networks. To provide high quality of service, high coverage ratio of sensor nodes in monitored area should be assured. Coverage holes may lead to routing failure and degrade the quality of service. A novel coverage hole discovery algorithm, VCHDA, is proposed for wireless sensor networks in this paper. The proposed algorithm is based ...
The majority of the research on protocol design for WSNs has focused on MAC and routing provision. An important class of protocols is represented by geographic or location-based routing schemes, where a relay is greedily selected based on the progression it provides toward the sink. ALBA-R is a protocol for converge casting in wireless sensor networks and features cross-layer integration of geo...
This paper deals with the tradeoffs between security, real-time and lifetime performance. Due to the multihop nature of communication wireless ad hoc networks are very vulnerable to attacks. Malicious nodes included in a routing path may misbehave and organize attacks such as black holes. Scaling the number of hops for a packet delivery we trade off energy efficiency against security and real-t...
MANET is developing the next generation wireless universe. However MANETS prove their performance only when routing is efficient. In this paper we propose a model of Dedicated Trust System (DTS) which aims in detecting the misbehaving nodes. We implement our DTD using zone routing protocol with trusted systems. We finally develop a reputation model with two new parameters trustee and bucy trust...
In this paper we consider lightweight routing in a wireless sensor network deployed in a complex geometric domain Σ with holes. Our goal is to find short paths of different homotopy types, i.e., paths that go around holes in different ways. In the example of Figure 1, there are three holes in the network and there are many different ways to “thread” a route from s to t. Observe that paths α, β,...
Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, ...
A Wireless Sensor Network (WSN) comprises of devices that are autonomously distributed in space used to supervise the physical and environmental conditions with the help of sensors. They are mainly used in security critical applications such as monitoring the environment, tracking the surroundings and controlling areas. Security is an important requirement in WSNs. Because of the resource limit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید