• No results found

wireless network resources utilization

An efficient resource management mechanism for network slicing in LTE network

An efficient resource management mechanism for network slicing in LTE network

... share network resources with other bearers of different users through a virtual layer, which is mapped to physical network resources (infrastructure) [22], ...cellular network ...

18

On the efficient utilization of radio resources in extremely dense wireless networks

On the efficient utilization of radio resources in extremely dense wireless networks

... a network with 500 users and 10 base stations regularly distributed over the simulated area with an inter-site distance of 300 ...assign resources to cluster heads with weights proportional to the cluster ...

7

A Model of Security Adaptation for Limited Resources in Wireless Sensor Network

A Model of Security Adaptation for Limited Resources in Wireless Sensor Network

... of wireless sensor network (WSN) devices is small but have exceptional ...mited resources in terms of battery capacity, CPU, memory, bandwidth, and data ...the network face real security ...a ...

15

Amputating wormhole attack in wireless sensor network using swarm 
		intelligence

Amputating wormhole attack in wireless sensor network using swarm intelligence

... Hoc Network (MANET), such as energy utilization, node authentication and secure ...The wireless medium of communication coupled with constrained resources enable attacks which can be executed ...

5

A Simple Balanced CH Selection Method For Network Life Time Maximization And Energy Utilization In Heterogeneous WSN

A Simple Balanced CH Selection Method For Network Life Time Maximization And Energy Utilization In Heterogeneous WSN

... the network and energy ...the utilization of energy, and improves the lifespan of the ...energy utilization coping is one amongst the method to amplify the system network ...energy ...

7

Dynamic Resource Allocation in Computing Clouds through Distributed Multiple Criteria Decision Analysis using PROMETHEE Method

Dynamic Resource Allocation in Computing Clouds through Distributed Multiple Criteria Decision Analysis using PROMETHEE Method

... its resources through MCDA only when imposed by the local ...the resources in the entire data center, the number of migrations per configuration is substantially less than the global solutions making our ...

10

Security framework against Denial of Service Attacks in Wireless Mesh Network Networks

Security framework against Denial of Service Attacks in Wireless Mesh Network Networks

... computer network, a wireless network to connect network nodes uses wireless data ...connection. Wireless networking are a way by which the houses, telecommunication ...

5

The Sixth Sense Technology

The Sixth Sense Technology

... the wireless network system and other mechanism and algorithms that are webbed altogether to suite the current wireless security system, still they have a lot of several ...the wireless ...

13

Ethical Hacking Course Layout

Ethical Hacking Course Layout

... o Types of Wireless Network ,Wireless Technology o Advantages and Disadvantages of Wireless Network o Wireless Cracking WEP,WPA,WPA2. o Wireless Security[r] ...

6

Optimization Based Approach for Land, Water and Human Resources Management: A Comparative Study

Optimization Based Approach for Land, Water and Human Resources Management: A Comparative Study

... optimal utilization of natural resources and maximizing benefits & minimizing trade-offs should be given higher priority to achieve the goals of reducing poverty and malnutrition as well as sustainable ...

9

ASSESSMENT OF RANGELAND RESOURCE UTILIZATION AND MANAGEMENT PRACTICE ON PASTORALIST IN AFDEM DISTRICT OF SITTI ZONE, SOMALI STATE, ETHIOPIA

ASSESSMENT OF RANGELAND RESOURCE UTILIZATION AND MANAGEMENT PRACTICE ON PASTORALIST IN AFDEM DISTRICT OF SITTI ZONE, SOMALI STATE, ETHIOPIA

... rangeland resources through technical and technological supports like, developing water points such as pond’s and cisterns as deemed necessary, and water harvesting activities to improve ground water discharge, to ...

19

Eradication of Selfish Node in MANET Using CSNA Mechanism

Eradication of Selfish Node in MANET Using CSNA Mechanism

... Network simulator (NS2) is used to analyze the performance of the proposed scheme. It is an open source programming language written in both the C++ and Object Oriented Tool Command Language. NS2 is an isolated ...

7

Optimum Power Utilization in Wireless Sensor Network using Partition Technique

Optimum Power Utilization in Wireless Sensor Network using Partition Technique

... In order to reduce the communication overhead we propose Balanced Energy Efficient Spanning Tree, it improves the sensor nodes lifetime. An important problem studied is to find balanced energy efficient routing tree by ...

5

Wireless network virtualization : a techno-economic analysis and a service differentiation strategy

Wireless network virtualization : a techno-economic analysis and a service differentiation strategy

... virtualized wireless HetNet, control layer functionalities ...high-level network policies in a software- defined ...virtual wireless HetNet is able to meet the critical performance characteristics of ...

206

Developmental Mode for Circular Economy in the Yellow River Delta

Developmental Mode for Circular Economy in the Yellow River Delta

... cascade utilization of resources and energy, and to develop leading enterprises into leading industry chain and network, the Yellow River delta has basically formed a circular economy industrial ...

6

Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks

Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks

... the wireless environment shown above three nodes are used as the sender nodes for the packet transmission through the wireless network to the ...

5

Convergence In Future Wireless Network Technology

Convergence In Future Wireless Network Technology

... the wireless operators are looking to increase value added service revenue similar to the developed markets, where operators have shifted focus towards data revenue, which has led to an improvement in ...

6

Wireless Sensor Network Surveillance on Forest Illegal Mining using 'Planned Behaviour Abortion Tower': Analytical Modelling

Wireless Sensor Network Surveillance on Forest Illegal Mining using 'Planned Behaviour Abortion Tower': Analytical Modelling

... inherited limitations such as convenient responses form the experts to reduce time for the interview as these men are highly engaging professionals. However, there was prior notice for them to choose appropriate time for ...

9

Wireless Sensor Network Technology and Networking Algorithms for Wireless Sensor Network Applications: A Survey

Wireless Sensor Network Technology and Networking Algorithms for Wireless Sensor Network Applications: A Survey

... the Wireless Sensor Network (WSN) is an emerging field of electronics, ensuring research of applied ...of wireless sensor network motivate to undertake the research work in this ...the ...

11

A Brief Study of Power Efficient Hierarchical          Routing Protocols in Wireless Sensor Networks

A Brief Study of Power Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

... So to overcome such problems, a number of protocols have been proposed for the purpose of data routing in sensor network. Such protocols can be classified into three main groups: data centric, location based and ...

5

Show all 10000 documents...

Related subjects