نتایج جستجو برای: hoc
تعداد نتایج: 50395 فیلتر نتایج به سال:
in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
this paper proposes a new smart antenna beamforming scheme based on electronically steerable parasitic array radiator (espar). the proposed method is capable of providing better capacity compared to the conventional espar. the termination of each antenna element in this structure comprises a pin diode in addition to a varactor. using pin diode besides the varactor provides more degrees of freed...
بهسازی گفتار یکی از شاخه های مهم پردازش گفتار است. امروزه با تنوع در کاربردهای پردازش گفتاری و وجود عوامل بسیار در تخریب سیگنال، امر بهسازی و بهبود کیفیت سیگنال گفتار از اهمیت زیادی برخوردار شده است. به عنوان یکی از روش های بهسازی (چندکاناله) گفتار، شکل دهی پرتو مطرح گردیده که با استفاده از آرایه های میکروفونی صورت می پذیرد. با توجه به محدودیت های موجود در نحوه چینش میکروفون ها، پنجره ای به سوی...
Wireless sensor ad-hoc network usually applied in a monitoring system like monitoring temperature, humidity or even any triggering inputs from a connected peripheral device. The approach of wireless ad hoc network for monitoring video data is under preliminary investigation and development because video streaming requires larger storage, quality channel, less jittering and low packet loss. The ...
We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to me...
The exchange of information between vehicles is a challenging issue for future Transportation applications. In vehicular Ad-Hoc network, the vehicles are interconnected with each other and they have not any additional infrastructure along the roadside. Vehicular Ad-hoc networks are eminent from other types of Ad-hoc networks. The Ad-hoc network attributed to their features such as infrastructur...
We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to me...
Security of mobile ad hoc networks is more challenging task due to its complex properties. In mobile ad hoc networks, intrusion detection system is known as the second line of defense because prevention based techniques are not a good solution for ad hoc networks due to its complex characteristics. For the security point of view, many intrusion detection systems have been proposed to mobile ad ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید