首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
无线电   8篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   1篇
  2017年   1篇
  2016年   2篇
  2012年   1篇
排序方式: 共有8条查询结果,搜索用时 15 毫秒
1
1.
Wireless Personal Communications - In today's world, wireless sensor network is an unavoidable technology especially for Internet of Things applications. But the nodes limited resource...  相似文献   
2.
3.
Wireless Personal Communications - Mobile computing gained much attention in current research arena due to the enhancement of services such as mobile learning, health care monitoring and e...  相似文献   
4.
The objective of the paper is to construct a backbone node with self organization, topology control and reconfiguration capabilities. The key issues in wireless networks are maintain a topology with minimum degree, self organization during link or node failure and reconstruction ability when the backbone changes the position. Existing research works concentrate on any one of the issues by a backbone, but nodes in wireless are battery operated. To solve the all issues separately more power is required. To overcome the existing issues we propose a localized approach namely STAB-WIN, which will solve all the issues without affecting the entire system performance using local updates. This research work focuses on multiservice ability of a node to meet the design goals of next generation networks. Our approach is witnessed by the simulation results on analyzing the parameters like scalability which includes backbone size, routing overhead, control transfer and QoS parameters.  相似文献   
5.

Secured self organizing network is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. In delay tolerant network packets storage exists when there is any link breakage between the nodes in the network so delay is tolerable in this type of network during the data transmission. But this delay is not tolerable in wireless network for voice packet transmission. This evokes the use of wireless networks. In a network, different wireless network topologies are interoperating with each other so the communication across the network is called overlay network. This network is vulnerable to attacks due to mobile behaviour of nodes and frequent changes in topologies of the network. The attacks are wormhole attack and blackhole attack is analysed in this paper. They are critical threats to normal operation in wireless networks which results in the degradation of the network performance. The proposed recovery algorithm for wormhole and the isolation of blackhole will increase the performance of the network. The performance metrics such as throughput, packet delivery ratio, end–end delay and routing overhead of the network are evaluated.

  相似文献   
6.

Large amount of data is generated each second around the world. Along with this technology is evolving each day to handle and store such enormous data in an efficient way. Even with the leap in technology, providing storage space for the gigantic data generated per second globally poses a conundrum. One of the main problems, which the storage server or data center are facing is data redundancy. Same data or slightly modified data is stored in the same storage server repeatedly. Thus, the same data is occupying more space due to its multiple copies. To overcome this issue, Data deduplication can be done. Existing deduplication techniques lacks in identifying the data in an efficient way. In our proposed method we are using a mixed mode analytical architecture to address the data deduplication. For that, three level of mapping is introduced. Each level deals with various aspects of the data and the operations carried out to get unique sets of data into the cloud server. The point of focus is effectively solving deduplication to rule out the duplicated data and optimizing the data storage in the cloud server.

  相似文献   
7.
Wireless Personal Communications - Over the last two decades, several researchers have recommended many remote user authentication schemes, following since introducing the concept way back...  相似文献   
8.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号