• No results found

Number of Nodes

Effects of Number of Nodes and Network Area Size Parameters on WSN
Protocols Performances

Effects of Number of Nodes and Network Area Size Parameters on WSN Protocols Performances

... discussed. Nodes number and network area are two parameters that have been used to test the performance of DEEC, DDEEC, EDEEC and TDEEC for different scenarios of three and multilevel heterogeneous ...super ...

8

Infinite solutions having a prescribed number of nodes for a Schrödinger problem

Infinite solutions having a prescribed number of nodes for a Schrödinger problem

... In this paper, we are concerned with the multiplicity of solutions for a Schrödinger problem. A weaker super-quadratic assumption is required for the nonlinearity. Then we give a new proof for the infinite solutions to ...

11

Queuing Approach to Estimate the MANET’s Optimal Number of Nodes

Queuing Approach to Estimate the MANET’s Optimal Number of Nodes

... Mathematical model is verified by experimentation and gives acceptable accuracy and provides a solution for selecting optimum number of nodes with certain area. So, this model gives more accurate ...

10

Persistence and Availability of Floating Content in a Campus Environment

Persistence and Availability of Floating Content in a Campus Environment

... The idea of FC appears in the state of the art under various denominations. In [12], a concept very much sim- ilar to FC called hovering information is presented. Two algorithms aiming at improving availability are ...

9

Secure Mobile Agent Based IDS for MANET

Secure Mobile Agent Based IDS for MANET

... other nodes, without having to move back to the originator ...collection, nodes exchange information about events to build the intrusion ...restricted number of nodes relates to bandwidth ...

8

BUSINESS PROCESS REENGINEERING TO IMPROVE PROCESS ALIGNMENT & INFORMATION SYSTEM 
PLATFORM AT STAINLESS EQUIPMENT COMPANY

BUSINESS PROCESS REENGINEERING TO IMPROVE PROCESS ALIGNMENT & INFORMATION SYSTEM PLATFORM AT STAINLESS EQUIPMENT COMPANY

... the number of timeslots per slotframe is between 10 and 1,000, and the duration per timeslot is 10 ...the number of timeslots correlates with the number of ...maximum number of nodes in ...

14

FSMA   A topology transparent scheme for opportunistic spectrum access

FSMA A topology transparent scheme for opportunistic spectrum access

... maximum number of nodes, N and maximum node degree, ∆ , no scheduling updates are needed when topology changes, as long as they are within the bounds of (N, ∆ ...

5

Performance Evaluation of TORA Protocol with
Reference to Varying Number of Mobile Nodes

Performance Evaluation of TORA Protocol with Reference to Varying Number of Mobile Nodes

... the number of ...different number of nodes, with the help of 2D and 3D graphs generated with ...the number of nodes that vary: ...

7

A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications

A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications

... Even though detecting and eliminating various attacks in the network, it is essential to consider the improve- ments in quality of service parameters obtained through the simulation. In this paper throughput, time taken, ...

19

NOMA enhanced computation over multi access channels

NOMA enhanced computation over multi access channels

... Abstract—Massive numbers of nodes will be connected in future wireless networks. This brings great difficulty to collect a large amount of data. Instead of collecting the data individually, computation over ...

17

1.
													Analysis and implementation of bus topology in opnet simulator environment

1. Analysis and implementation of bus topology in opnet simulator environment

... limited number of ...limited number of nodes. Now a day it has changed to more number of nodes to be connected to a LAN ...the number of ...10 number of nodes has ...

6

Comparative Performance Analysis of Teen Sep Leach Erp Eammh and Pegasis Routing Protocols

Comparative Performance Analysis of Teen Sep Leach Erp Eammh and Pegasis Routing Protocols

... In this paper we have given the comparison of the five routing techniques. Since the goal of this comparison is to maximize the lifetime of the network or to minimize the energy consumption. Results show that stability ...

6

A Binary Harmony Search Algorithm for Solving the Maximum Clique Problem

A Binary Harmony Search Algorithm for Solving the Maximum Clique Problem

... 125 nodes and a density of ...different Number of Function Evaluation (NFE) by harmony ...large number of NFEs are ...the number of nodes in the ...

6

Title: HASH TREE ALGORITHM FOR CENTRALIZED COGNITIVE RADIO NETWORKS

Title: HASH TREE ALGORITHM FOR CENTRALIZED COGNITIVE RADIO NETWORKS

... ABSTRACT: Hash tree is a tree in which every non-leaf node is labeled with the hash of the labels of its children nodes. Hash trees are useful because they allow efficient and secure verification of the contents ...

11

Layer Wise Topology Design for Cost Effective IP Optical Networks

Layer Wise Topology Design for Cost Effective IP Optical Networks

... 2) Optical layer: The number of WDMs determines the cost of the optical layer, so the maximum number of wavelengths should be minimized. Each node pair linked by one optical fiber or is not linked. A WDM is ...

5

SSHLDA: A Semi Supervised Hierarchical Topic Model

SSHLDA: A Semi Supervised Hierarchical Topic Model

... Unsupervised non-hierarchical topic models are widely studied, such as LSA (Deerwester et al., 1990), pLSA (Hofmann, 1999), LDA (Blei et al., 2003), Hierarchical-concept TM (Chemudugunta et al., 2008c; Chemudugunta et ...

10

An Improved Indexing and Matching  Method for Mathematical Expressions  Based on Inter Relevant Successive Tree

An Improved Indexing and Matching Method for Mathematical Expressions Based on Inter Relevant Successive Tree

... ISTR is an index model for one dimensional Chinese characters and strings. When the indexing object is Chinese characters, a single Chinese character is served as a node in the tree that can express words or sentences, ...

17

FLEXIBLE SHARING IN DHT BASED P2P NETWORKS USING METADATA OF RESOURCE

FLEXIBLE SHARING IN DHT BASED P2P NETWORKS USING METADATA OF RESOURCE

... anchor nodes distribute evenly and intensively, unknown nodes can be accurately ...anchor nodes is higher than that of common nodes, cost of deploying network will increase when they are ...

6

Title: Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network

Title: Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network

... hidden nodes are taken we get better result in less training ...the number of hidden layers then accuracy can be obtained up to great extent but neural network became complex then ...selecting number ...

10

Precise Asymptotic Distribution of  the Number of Isolated Nodes in  Wireless Networks with  Lognormal Shadowing

Precise Asymptotic Distribution of the Number of Isolated Nodes in Wireless Networks with Lognormal Shadowing

... isolated nodes is not only a prerequisite but also a good indication of network ...isolated nodes in the network as the node density n → ∞ (see Penrose ...the number of isolated nodes in the ...

16

Show all 10000 documents...

Related subjects