首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
无线电   2篇
自动化技术   1篇
  2020年   1篇
  2013年   1篇
  2008年   1篇
排序方式: 共有3条查询结果,搜索用时 0 毫秒
1
1.
Multicast routing in mobile ad hoc networks (MANETs) poses several challenges due to inherent characteristics of the network such as node mobility, reliability, scarce resources, etc. This paper proposes an Agent Based Multicast Routing Scheme (ABMRS) in MANETs, which uses a set of static and mobile agents. Five types of agents are used in the scheme: Route manager static agent, Network initiation mobile agent, Network management static agent, Multicast initiation mobile agent and Multicast management static agent. The scheme operates in the following steps: (1) to identify reliable nodes; (2) to connect reliable nodes through intermediate nodes; (3) to construct a backbone for multicasting using reliable nodes and intermediate nodes; (4) to join multicast group members to the backbone; (5) to perform backbone and group members management in case of mobility. The scheme has been simulated in various network scenarios to test operation effectiveness in terms of performance parameters such as packet delivery ratio, control overheads and group reliability. Also, a comparison of proposed scheme with MAODV (Multicast Ad hoc on-demand Distance Vector) protocol is presented. ABMRS performs better than MAODV as observed from the simulation. ABMRS offers flexible and adaptable multicast services and also supports component based software development.  相似文献   
2.
Next generation vehicles will have capability of sensing, computing, and communicating capabilities. Different components in a vehicle have to constantly exchange available information with other vehicles on the road and cooperate for the purpose of ensuring safety and comfort using a Vehicular Ad hoc Network (VANET). Critical information like navigation, cooperative collision avoidance, lane-changing, speed limit, accident, obstacle or road condition warnings, etc. play a significant role for safety-related applications in VANET. Such kind of critical information gathering and dissemination is challenging, because of their delay-sensitive nature. This paper proposes an agent based model that consists of heavy-weight static cognitive (based on Belief Desire Intention : BDI) and light-weight mobile agents. Proposed model executes push (gather/store and disseminate) and pull (gather/store) operations on information gathered based on information relevance, criticalness and importance. The simulation results show that BDI based information gathering and dissemination scheme performs better than the reliable broadcast scheme in terms of bandwidth utilization, packet delivery ratio, push latency (information saturation time) and push/pull decision latency.  相似文献   
3.

The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.

  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号