نتایج جستجو برای: flood routing
تعداد نتایج: 76636 فیلتر نتایج به سال:
Different types of Optimizing the Parameters Hydrological Routing Methods using Particle Swarm Optimization (PSO) Algorithm for Flood in Karun River
introduction flood is a natural hazard that its occurrences can be observed more frequently in recent years. for better flood mitigation and control, it is needed to identify flood production factors and determine the high potential flood areas. hydrological model is a simplified representation of natural system and the rainfall-runoff model is one of the most frequently used events for flood s...
Researchers have come up with various routing solutions for WSNs. Some of the algorithms concentrate on setting up an event path to send that information; some other algorithms flood that information throughout the network. These techniques suffer from extra power requirement, making them unsatisfactory in case of WSNs. This paper proposes to handle multiple events routing in an energy efficien...
There is an increasing need for strategic global assessments of flood risks in current and future conditions. In this paper, we propose a framework for global flood risk assessment for river floods, which can be applied in current conditions, as well as in future conditions due to climate and socio-economic changes. The framework’s goal is to establish flood hazard and impact estimates at a hig...
In this paper we propose and discuss an optimized link state routing protocol, named OLSR, for mobile wireless networks. The protocol is based on the link state algorithm and it is proactive (or table-driven) in nature. It employs periodic exchange of messages to maintain topology information of the network at each node. OLSR is an optimization over a pure link state protocol as it compacts the...
The hierarchical routing protocols based on clusters rely fundamentally on their CHs for data aggregation and routing. They are vulnerable to several attacks, such as Hello flood, Selective forwarding, replay, etc; attacks involving CH are the most damaging. If a malicious node managed to become a CH, it can launch attacks to disrupt the network operation. Note that, the malicious node can choo...
Flood disasters from dam breaks cause serious loss of human life and immense damage to infrastructure and economic stability. The application of Geographic Information System technology integrated with hydrological modeling for mapping flood-inundated areas and depth can play a momentous role in further minimizing the risk and possible damage. In the present study, base terrain data, hydrologic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید