نتایج جستجو برای: alternate load path method
تعداد نتایج: 1881826 فیلتر نتایج به سال:
The objective of investigating information load is to predict atid iinprove individual performance, since performance deteriorates when information load exceeds the overload point. Models of inei}tal workload (an alternate term for information load) developed in psychology feature mostly task and subject-related intluences on mental workload. These models, however, have not yet migrated into ma...
In IEEE 802.16 Wireless Mesh Networks (WMN) routing, delay aware load balancing can be achieved by selecting the shortest path with low latency and network load. But network load and latency together are not considered in most of the existing routing metrics. Here, we propose a delay aware load balanced routing protocol for wireless mesh networks by designing a combined route metric. Initially,...
Wireless networking has witnessed an explosion of interest from consumers in recent years for its applications in mobile and personal communication. Energy efficiency is also an important design consideration due to the limited battery life of wireless node. In order to maximize the network life time and to minimize energy consumption, instead of routing through shortest path we propose routing...
Today, link-state routing protocols that compute multiple shortest paths predominate in data center and campus networks, where routing is performed either in layer three or in layer two using link-state routing protocols. But current proposals based on link-state routing do not adapt well to real time tra c variations and become very complex when attempting to balance the tra c load. We propose...
in restructured power systems and in a wholesale power market, a distribution company as a market player intends to maximize its profit by utilizing its options. hence determining an optimal energy acquisition strategy for a distribution company is vital, for attaining to this goal. however an important challenge for determining these strategies is forecasting other competitors and generation c...
In this paper we discuss the threat of malware targeted at extracting information about the relationships in a real-world social network as well as characteristic information about the individuals in the network, which we dub Stealing Reality. We present Stealing Reality (SR), explain why it differs from traditional types of network attacks, and discuss why its impact is significantly more dang...
The use of multilevel inverters is widespread in medium voltage applications due to their inherent voltage sharing among the devices. This work proposes three phase five level Flying Capacitor Multilevel Inverter (FCMLI) using various modulating techniques for induction motor load. These Pulse Width Modulating (PWM) techniques include Carrier Overlapping (CO) strategy, Variable Frequency (VF) s...
A recent study characterizing failures in computer networks shows that transient single element (node/link) failures are the dominant failures in large communication networks like the Internet. Thus, having the routing paths globally recomputed on a failure does not pay off since the failed element recovers fairly quickly, and the recomputed routing paths need to be discarded. In this paper, we...
Synthesis of shape morphing compliant mechanism is inherently different from typical single output design problems, due to the multiple output points along the morphing boundary. We have previously developed a genetic algorithm (GA) based synthesis approaches, incorporating a binary ground structure parameterization, to systematically design shape morphing compliant mechanisms. However, the app...
One of the ambitions when designing the Stream Control Transmission Protocol was to o er a robust transfer of tra c between hosts. For this reason SCTP was designed to support multihoming, which presumes the possibility to set up several paths between the same hosts in the same session. If the primary path between a source machine and a destination machine breaks down, the tra c may still be se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید