• No results found

Node movement

Performance Evaluation of Epidemic Routing Protocol for Delay Tolerant Network Based on Node Movement Model

Performance Evaluation of Epidemic Routing Protocol for Delay Tolerant Network Based on Node Movement Model

... Based Movement Model and Random Waypoint ...two node movement models is done for delivery probability ratio and transmission ...purpose. Node progress is put into practice by means of ...

5

Improving Energy Efficiency using Mobility based Data Compression in LEACH-C for Wireless Sensor Networks

Improving Energy Efficiency using Mobility based Data Compression in LEACH-C for Wireless Sensor Networks

... with node mobility into consideration. Node movement is introduced randomly along a particular distance covered by the ...The node with the highest energy and lesser mobility is chosen to be ...

7

MOBILITY management has long been recognized as a

MOBILITY management has long been recognized as a

... a node is too large to be useful for the calculation of the predicted sensor measurements, as described in Section ...of node movement will cause a drastic change in a node’s two consecutive ...a ...

16

Obstacle Avoiding Connectivity Restoration based on Node’S Movement and Deploying New Relay Node in Disjoint Mobile Sensor Networks

Obstacle Avoiding Connectivity Restoration based on Node’S Movement and Deploying New Relay Node in Disjoint Mobile Sensor Networks

... mobile node, it must not be the cut-vertex ...of node movement, we use the method of phase Ⅰ to select the nearest mobile nodes of each pair of isolate islands to ...select node moving have ...

7

RELIABLE CLUSTER FORMING PROTOCOL IN VANET

RELIABLE CLUSTER FORMING PROTOCOL IN VANET

... a node is accounted using the parameters such as neighbourhood (nbd), degree (D), degree of difference (DOD), sum of degree of difference (SOD), battery power (Bp), node movement (Nm), delivery delay ...

13

An Efficient Localization Method for Mobile Nodes in Wireless Sensor Networks

An Efficient Localization Method for Mobile Nodes in Wireless Sensor Networks

... mobile node localization has become one of the hotspots in wireless sensor ...mobile node movement, in this paper we propose an im- proved mobile node localization algorithm based on the Monte ...

14

Context Aware Load Balancing in IoT

Context Aware Load Balancing in IoT

... This paper presents context aware load balancing in Internet of Things, load balancing is the spreading of the traffic along multiple routes that reduce the packet loss in the network. Load balancing is done by computing ...

5

Sink Mobility Schemes in Wireless Sensor Networks for Network Lifetime Extension

Sink Mobility Schemes in Wireless Sensor Networks for Network Lifetime Extension

... In order to implement the idea of mobile sink in sensor network system, broad kinds of strategies, protocols and algorithms have been proposed and most of them show notable improvements in wireless sensor network area. ...

73

Trust and Reciprocity in 2 node and 3 node Networks

Trust and Reciprocity in 2 node and 3 node Networks

... Notice that we can restrict G by eliminating one of its coordinates—say the coordinate for Sender α’s profits; such a restriction is the α-free slice of G. Thus the α-free slice of G is the set of possible distributions ...

38

An Efficient Approach for Routing In Mobile Adhoc Network

An Efficient Approach for Routing In Mobile Adhoc Network

... An adhoc is a collection of wireless mobile hosts forming a temporary network without the aid of any stand alone infrastructure or centralized administration .In a MANET, there is no fixed infrastructure (Base Station) ...

8

Understanding Hadoop Clusters and the Network

Understanding Hadoop Clusters and the Network

... Client writes Span the HDFS Cluster Client Rack N Data Node Data Node Data Node Data Node Data Node Data Node switch File.txt Rack 4 Data Node Data Node Data Node Data Nod[r] ...

23

Simian immunodeficiency virus infection of CD8+ lymphocytes in vivo.

Simian immunodeficiency virus infection of CD8+ lymphocytes in vivo.

... lymph node lymphocytes (LNL) were positively selected (>97% purity) for surface expression of CD4, CD8, or CD20 and then analyzed for SIV provirus using semiquantitative DNA amplifi- ...

5

QoS amendment toward 
		seamless handover in network mobility NEMO

QoS amendment toward seamless handover in network mobility NEMO

... both node-level and network-level in order to efficiently manage the ...(i.e. node-level and network-level) as well as between the NEMO network and the visited network ...Mobile Node (MN) and Mobile ...

12

Development of an exercise intervention for the prevention of musculoskeletal shoulder problems after breast cancer treatment: the prevention of shoulder problems trial (UK PROSPER)

Development of an exercise intervention for the prevention of musculoskeletal shoulder problems after breast cancer treatment: the prevention of shoulder problems trial (UK PROSPER)

... Advances in the early detection and improved treatment of breast cancer have resulted in increased survival after diag- nosis, resulting in many more women living with the conse- quences of cancer treatment [1]. Invasive ...

12

Efficient Transmission From Node To Node with Mobile Sink in Clustering Using Sensor Node

Efficient Transmission From Node To Node with Mobile Sink in Clustering Using Sensor Node

... We evaluate the performance of Mobile sink and Enhanced Mobile Clustering Algorithm using Network simulator with the 100-node network in a play field of size 100m x 100m. The base station is located at position ...

7

Assessment of pedestrian movement scenario and strategies to improve pedestrian movement in mysore city

Assessment of pedestrian movement scenario and strategies to improve pedestrian movement in mysore city

... Pedestrian movement is one of the most common and basic forms of transportation. Walking should be considered the primary form of transport, as it is the most sustainable and environmentally friendly mode. Areas ...

6

Survey On Nearest Neighbor Based Security Scheme Against Black Hole Attack In MANET
                 

Survey On Nearest Neighbor Based Security Scheme Against Black Hole Attack In MANET  

... source node verifies the authenticity of node that initiates RREP by finding more than one route to the ...source node waits for RREP packet to arrive from more than two ...source node ...

5

Provision of Mobile Temporary Toilets for Construction in Case of a Multi Storeyed Building Construction Project

Provision of Mobile Temporary Toilets for Construction in Case of a Multi Storeyed Building Construction Project

... fro movement to the mobile toilet if provided on the same floor and total non-productive man hours lost per day per floor is more than 6 hours and it is depending upon ...

6

The Congestion Control Based on Routing Protocol in the Internet of Things

The Congestion Control Based on Routing Protocol in the Internet of Things

... communication node serves as a router to forward a ...communication node packet reception is greater than sending data packets, the queue space will continuously decrease and the data packet loss will ...a ...

7

1.
													Performance analysis for selfish attack detection using coopon technique

1. Performance analysis for selfish attack detection using coopon technique

... To detect the selfish cognitive radio attack cooperative neighbouring cognitive radio nodes (COOPON) detection techniques is used. COOPON is designed for CR ad-hoc networks with multiple channels and is designed for the ...

9

Show all 10000 documents...

Related subjects