• Nenhum resultado encontrado

[PDF] Top 20 ADHOC MOBILE WIRELESS NETWORK ENHANCEMENT BASED ON CISCO DEVICES

Top PDF ADHOC MOBILE WIRELESS NETWORK ENHANCEMENT BASED ON CISCO DEVICES were compiled by 1Library PT

ADHOC MOBILE WIRELESS NETWORK ENHANCEMENT BASED ON CISCO DEVICES

ADHOC MOBILE WIRELESS NETWORK ENHANCEMENT BASED ON CISCO DEVICES

... Cisco a leading networking company all over the world right now with the highest sales rates all over the world becomes the first premiere networks company in our time.[1] So, in this paper we will define, ... See full document

14

IMPULSE RADIO ULTRA WIDE BAND BASED MOBILE ADHOC NETWORK ROUTING PERFORMANCE ANALYSIS

IMPULSE RADIO ULTRA WIDE BAND BASED MOBILE ADHOC NETWORK ROUTING PERFORMANCE ANALYSIS

... Band based wireless networks which Employs Dynamic Nature Routing (EDNR) method for determining and selecting the stable route in Mobile Adhoc Network ...information on ... See full document

6

Projeto de redes Ad Hoc sem fio ciente de topologia

Projeto de redes Ad Hoc sem fio ciente de topologia

... of Wireless Ad Hoc Networks and the network ...the network topology to three differ- ent network models, namely (i) wireless sensor networks (WSNs), (ii) mobile ad hoc networks ... See full document

213

A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS

A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS

... Initially wireless networks were fully infrastructure based and hence imposed the necessity to install base ...of mobile adhoc networks, these problems are mitigated, by allowing certain ... See full document

8

Mobile Node for Wireless Sensor Network to Detect Landmines

Mobile Node for Wireless Sensor Network to Detect Landmines

... A liquid crystal display (LCD) is a thin, flat display device made up of any number of color or monochrome pixels arrayed in front of a light source or reflector. It is utilized in battery-powered electronic ... See full document

5

Mobile Adhoc Network(MANETS) : Proposed solution to Security Related Issues

Mobile Adhoc Network(MANETS) : Proposed solution to Security Related Issues

... supplicant's network adapter derives the TKIP key (Temporal Key Integrity Protocol), the packet integrity key, and other cryptographic ...in wireless networks, there have been works to tunnel EAP within a ... See full document

9

Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

... of network protocols for ...each mobile node in a MANET performs the routing function; the “death” of even a few of the nodes due to energy depletion might cause disruption of service in the entire ... See full document

6

Ubiquitous model for wireless sensor networks monitoring

Ubiquitous model for wireless sensor networks monitoring

... Abstract— Wireless sensor networks (WSNs) belong to emerging technologies where network devices can interact with the surrounding environment by sensing physical ...of mobile devices to ... See full document

71

Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

... is based on the concept of ...TORA network performance, using the well known network simulator OPNET ...in wireless adhoc network using learning ...different mobile ... See full document

11

Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

... Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network [20] infrastructure and centralized administration ...shared wireless medium. [21] Network ... See full document

9

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network

... 72 Management Protocol (ISAKMP) defines packet format and procedures to negotiate, modify, establish and delete Security Associations (SAs). ISAKMP defines payloads for exchanging key generation and authentication data. ... See full document

8

Transinformação  vol.29 número3

Transinformação vol.29 número3

... focused on the knowledge of the requirements for library automation demand on teacher to develop an educational content to enable the student to learn through videos in order to increase the knowledge about ... See full document

11

Pedro Miguel dos Santos Martins

Pedro Miguel dos Santos Martins

... Este projeto foi realizado por Teemu Ahonen, Reino Virrankoski e Mohammed Elmusrati na "University of Vaasa"no "Department of Computer Science"em "Vaasa"na Finlândia, em que foi desenvolvido um ... See full document

169

Student's Mobile Information Prototype for the Higher Education Environment

Student's Mobile Information Prototype for the Higher Education Environment

... been on the focus of scholars attention; Moura and Carvalho (2003) defined m-learning as an extension of distance learning supported by wireless mobile technologies, Trifonova and Ronchetti (2003) ... See full document

6

Cross Layer Optimization Based on Rate Distribution in Multirate Wireless Sensor Network

Cross Layer Optimization Based on Rate Distribution in Multirate Wireless Sensor Network

... whole network, data aggregation usually has to be performed early in the local ...problem on aggregation points and the lack of load balancing, which deteriorates the network ...efforts on the ... See full document

8

Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

... The main constraint in designing a routing protocol in WSNs is limited power of sensor nodes that mandates the design of energy-efficient communication protocol. There are many protocols proposed for other ... See full document

13

Biometrics on Mobile Devices Using the Heartbeat

Biometrics on Mobile Devices Using the Heartbeat

... Shen et al. using a one-lead ECG extraction, proved in [42] that an identification system can be created using heartbeat as a biometric feature. Using the QRS complex and normalizing the QT interval to extract features, ... See full document

111

Efficiency in Motion: The New Era of E-Tickets

Efficiency in Motion: The New Era of E-Tickets

... android mobile device to test our algorithm, and to make sure that the application works with all of the layouts and ...android mobile devices, which are Samsung Galaxy Tab 2, Samsung Galaxy Tab 4, ... See full document

5

Distributed crowd-based annotation of soccer games using mobile devices

Distributed crowd-based annotation of soccer games using mobile devices

... this mobile application, because, in order to be efficient, it would have to represent the different moments and events that occur during a soccer match as best as ...presented on this paper, where it is ... See full document

9

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

... in Mobile Ad hoc network our Nodes are highly ...the Network. Due to this network topology and number of neighboring nodes in each node frequently ...another network also affect to the ... See full document

6

Show all 10000 documents...