نتایج جستجو برای: fuzzy end node
تعداد نتایج: 648134 فیلتر نتایج به سال:
Wireless Mesh Networks are self organizing, self configurable, self-healing wireless networks. Due to complex infrastructure of WMN, to maintain the quality of service is a tedious task. In this paper, a QoS routing scheme has been proposed. This scheme is based on two models named fuzzy inference system model and agent based model. Both models are installed on each and every node on the networ...
Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through Drop-Tail policy where the node drops the incoming packets to its queues during overflow condition. Many studies ...
The internet of things (IoT) based on a network layer perspective includes low-power and lossy networks (LLN) that are limited in terms power consumption, memory, energy usage. routing protocol used these is called over (RPL). Therefore, the IoT include smart objects need multiple for their interconnections which makes traffic load balancing techniques indispensable to RPL protocol. In this pap...
The concept of fuzzy magic labeling is introduced.Fuzzy magic labeling for some graphs like path, cycle and star graph are defined. It is proved that, every fuzzy magic graph is a fuzzy labeling graph, but the converse is not true. And we show that the removal of a fuzzy bridge from a fuzzy magic graph G, such that G* is a cycle with odd number of nodes is a fuzzy magic graph.And also some prop...
Abstract User authentication is a critical security function for computer systems that allow legitimate users remote access over an insecure communication network. In this paper, we propose a new password-based authentication scheme for heterogeneous sensor networks that consist of sensor nodes of different types. The proposed scheme allows legitimate users to query sensor data at any sensor no...
In this paper we estimate the end-to-end capacity and available bandwidth of a path between a pair of nodes in an IEEE 802.11b ad hoc network using dispersion traces between packet pairs of different lengths. The pairs of packets that suffer the minimum delay are used to estimate the maximum achievable transmission rate as a function of packet length, for any packet length, while the variabilit...
The work deals with a recognition problem using a probabilistic-fuzzy model and multistage decision logic. A case where a loss function is described using fuzzy numbers has been considered. The globally optimal Bayes strategy has been calculated for this case with stage-dependent and dependent on the node of the decision tree fuzzy loss function. The obtained result is illustrated by a calculat...
Load balancing is a technique for equal and fair distribution of load on resources and maximizing their performance as well as reducing the overall execution time. However, meeting all of these goals in a single algorithm is not possible due to their inherent conflict, so some of the features must be given priority based on requirements and objectives of the system and the desired algorithm smu...
The node localization problem in mobile sensor networks has received significant attention. Recently, particle filters adapted from robotics have produced good localization accuracies in conventional settings. In spite of these successes, state of the art solutions suffer significantly when used in challenging indoor and mobile environments characterized by a high degree of radio signal irregul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید