نتایج جستجو برای: network protocol

تعداد نتایج: 879051  

Journal: :Journal of Control, Automation and Systems Engineering 2005

Journal: :DEStech Transactions on Computer Science and Engineering 2019

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

Journal: :مهندسی برق و الکترونیک ایران 0
javad taheri mohammad kazem akbari

among structured peer-to-peer systems, chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. however, chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing latency an...

Today, information networks play an important role in supply chain management. Therefore, in this article, clustering-based routing protocols, which are one of the most important ways to reduce energy consumption in wireless sensor networks, are used to optimize the supply chain informational cloud network. Accordingly, first, a clustering protocol is presented using self-organizing map neu...

Journal: :journal of advances in computer research 2015
hamidreza alrezaamiri mehdi golsorkhtabaramiri masoud farmanbar hamed naeemaeiaali

a typical radio frequency identification system (rfid) includes one reader and a number of tags. the reader transmit to commands to the tags with interrogation radio signals, and tags receive the command and then respond with their identification. readers with interrogation signals can read tags’ responses. in rfid systems, when multiple tags respond to one reader simultaneously, tag collision ...

Journal: :journal of advances in computer research 2016
mona mojtabaee morteza romoozi hamideh babaei

content discovery is one of the fundamental issues that determines the architecture and performance of content distribution networks based on peer-to-peer (p2p) networks. to administrate the costs and discoveries, peers of a p2p network communicate with each other by one or more overlay layers. the condition of node’s relations in overlay networks, have a great impact in efficiency of networks....

Routing in Wireless Sensor Networks (WSNs) is a very challenging task due to the large number of nodes, their mobility and lack of proper infrastructure. Since the sensors are battery powered devices, energy efficiency is considered as one of the main factors in designing routing protocols in WSNs. Most of energy-aware routing protocols are mere energy savers that attempt to decrease the energy...

Journal: :The Scientific World Journal 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید