iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ routing
جزئیات خدمات ترجمه در ترجمه تخصصی
pre xes
pre xes
routing
routing
network
network
network
routing
routing
routing
routing
routing
routing
routing
cluster
routing
cluster
cluster
routing
routing
cluster
routing
cluster
cluster
routing
Journal of Computer Science 10 (1): 85-90, 2014
083x_FMi.book Page i Thursday, July 3, 2003 12:49 PM
Ad Hoc Networks xxx (2012) xxx–xxx
Ad Hoc Networks xxx (2012) xxx–xxx
Priorwork Prior workon CTPmostlyfocused onevaluatingthe performance of this protocolinstaticwireless sensor
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
As we will see, both interior and exterior routing protocols achieve routing
Seema Mehla et. al. / (IJCSE) International Journal on Computer Science and Engineering
A new VPN routing approach for large scale
Computer Communications 35 (2012) 619–627
Elastic-BufferFlowControlforOn-ChipNetworks
International Journal of Future Generation Communication and Networking
Computers & Operations Research 39 (2012) 461–470
DANoC: A dynamic adaptive Network on Chip
DANoC: A dynamic adaptive Network on Chip
2.5 Communication Costs in Parallel Machines
Int. J. Advanced Networking and Applications 1323
Key Factor and Interaction for Network Performance
2011 First International Conference on Informatics and Computational Intelligence 2011 First International Conference on Informatics and Computational Intelligence
Dual Gateway Routing Protocol | DeepDyve https://www.deepdyve.com/lp/institute-of-electrical-and-electronics-engi...
Dual Gateway Routing Protocol | DeepDyve https://www.deepdyve.com/lp/institute-of-electrical-and-electronics-engi...
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012
To appear in Smart Environments: Technologies, Protocols, and Applications
2010 Second International Workshop on Education Technology and Computer Science
Identity development
Identity development
Identity development
طراحی پردازنده
Identity development
TOPICS IN LIGHTWAVE
Journal of Network and Computer Applications 38 (2014) 185–201
W. Guo, W. Zhang / Journal of Network and Computer Applications 38 (2014) 185–201 187
11
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
www.ijecs.in
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
s suitability iscaptured by the cost itincurs tosend apacket to
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 21
Research ABSTRACT Traffic engineering involves adapting the routing of traffic
TOPICS IN INTERNET TECHNOLOGY
Research ABSTRACT Traffic engineering involves adapting the routing of traffic
ABSTRACT Traffic engineering involves adapting the routing of traffic to
An Advanced NoP Selection Strategy for Odd-Even
Available online at www.sciencedirect.com
Vehicular Communications 1 (2014) 33–52
ARoutingArchitecturefor
CAESAR LAYOUT 11/3/05 12:01 PM Page 5
To appear in Smart Environments: Technologies, Protocols, and Applications
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
Wireless Pers Commun (2013) 73:1289–1308
J. Shanghai Jiaotong Univ. (Sci.), 2014, 19(4): 466-475
242 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 2, FEBRUARY 2014
G Model
Information Sciences 265 (2014) 23–35
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
WANG LAYOUT 8/22/05 11:16 AM Page 57
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
we let each node gather location information and find routing
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
شبکه
Modified Adhoc on Demand Routing
Sixth IEEE International Workshop on Network Science for Communication Networks (NetSciCom 2014)
Sixth IEEE International Workshop on Network Science for Communication Networks (NetSciCom 2014)
Stable Internet Routing Without Global Coordination
Stable Internet Routing Without Global Coordination
41
Vehicular Communications 1 (2014) 33–52
Vehicular Communications 1 (2014) 33–52
2011 First International Conference on Informatics and Computational Intelligence 2011 First International Conference on Informatics and Computational Intelligence
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
Computer Networks 57 (2013) 179–196
The Journal of China
High Throughput Path Selection For Multi-Path
A Delay-Tolerant Network Architecture for Challenged
Computers & Industrial Engineering 65 (2013) 286–296
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
Data Communication Networks
network layer
NamedDataNetworking
A group of wireless mobile hosts making a temporary network
Int. J. Electron. Commun. (AEÜ) 69 (2015) 432–441
Network Layer: Part II
Network Layer: Part II
Advanced Secure Routing in Ad hoc mobile
IBAN
Arbutus: Network-Layer Load Balancing for
Globecom 2014 - Wireless Networking Symposium
World Applied Sciences Journal 32 (8): 1499-1505, 2014
Journal of Systems Architecture 59 (2013) 693–708
2015 4th MEDIAN Workshop
ASAR: An ant-based service-aware routing algorithm for
Energy efficient and perceived QoS aware video routing over Wireless
Globecom 2014 - Wireless Networking Symposium
Performance Evaluation of Routing Protocols for
Computers and Electrical Engineering xxx (2015) xxx–xxx
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
IEEE - 33044
Globecom 2014 - Wireless Networking Symposium
Globecom 2014 - Wireless Networking Symposium
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
This regular paper was presented as part of the main
This regular paper was presented as part of the main
This regular paper was presented as part of the main
J.ParallelDistrib.Comput.74(2014)2615–2625
A Simulation-Based Multi-objective Optimization Study of the Fleet Sizing
is a wireless network consists of large number of sensor
Experimentation
2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control
JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 3, MARCH 2010 211
Applied Soft Computing 11 (2011) 1953–1964
Vehicular delay- toler ant
Vehicular delay- toler ant
Vehicular delay- toler ant
2010 IEEE Annual Symposium on VLSI
2010 IEEE Annual Symposium on VLSI
ScienceDirect
Hybrid Approach for Routing in Vehicular Ad-hoc
ScienceDirect
Hasani
2010 IEEE Annual Symposium on VLSI
CROSS-LAYER SCHEDULING IN CLOUD COMPUTING
1. Introduction
1. Introduction
The attackers exactly use the radio jamming and battery exhaustion methods to
An Energy Aware Cellular Learning Automata Based
Int. J. Electron. Commun. (AEÜ) 69 (2015) 455–457
International Journal of Engineering Research & Technology (IJERT)
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Power-Efficient TCAM Partitioning for
Lab 1 Introduction to Access Noxim
Lab 1 Introduction to Access Noxim
2 Published Approaches for the Routing of Forklifts in a
6 A Case Study The analysis of a warehouse of
6 A Case Study The analysis of a warehouse of
HYDROLOGICAL PROCESSES, VOL. 11, 1881–1894 (1997)
HYDROLOGICAL PROCESSES, VOL. 11, 1881–1894 (1997)
HYDROLOGICAL PROCESSES, VOL. 11, 1881–1894 (1997)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2011 proceedings.
1426 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 8, AUGUST 1999
International Journal of Computational Intelligence Research
Available online at www.sciencedirect.com
NLSR: Named-data Link State Routing Protocol
Computing (2013) 95:723–738
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Alexandria Engineering Journal (2015) xxx, xxx–xxx
Available online at www.sciencedirect.com
SECURITY PROBLEMS
SECURITY PROBLEMS
Preface
Preface
Journal of Network and Computer Applications 39 (2014) 93–103
Analyzing the Performance of Centralized Clustering Techniques for Realistic Wireless Sensor Network Topologies
J.ParallelDistrib.Comput.74(2014)2615–2625
J.ParallelDistrib.Comput.74(2014)2615–2625
Low Level Security Mechanisms
Information Fusion xxx (2013) xxx–xxx
Journal of Network and Computer Applications 39 (2014) 140–151
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
A Comparative Analysis
Journal of Network and Computer Applications 39 (2014) 93–103
A distributed approach Introduction Vehicular applications fall into two broad
2015 IEEE 9th International Symposium on Embedded Multicore/Many-core Systems-on-Chip
2015 IEEE 9th International Symposium on Embedded Multicore/Many-core Systems-on-Chip
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Routing in Vehicular Ad Hoc
ARTICLE IN PRESS
22 | Operator's manual
18 | Operator's manual
22 | Operator's manual
2009 International Conference on Computational Intelligence and Security
Applied Soft Computing 38 (2016) 469–476
G Model
G Model
94
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Wireless Pers Commun
Available online at www.sciencedirect.com
Wireless Pers Commun
Available online at www.sciencedirect.com
Wireless Pers Commun
Improving Routing Efficiency for Network-on-Chip through
A New Fuzzy Input Selection Technique to Increase Routing
A New Fuzzy Input Selection Technique to Increase Routing
2010 IEEE Annual Symposium on VLSI
ICCCCT-10
94
Wireless Sensor Networks
1 CharacteristicsVehicular ad hoc networks can be considered as
a centralized optimal scheduling algorithm can be realized in the
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
پروتکل مسیریابی در شبکه مش
IET Wireless Sensor Systems
JID:SCICO AID:1977 /FLA [m3G; v1.172; Prn:22/01/2016; 13:36] P.1 (1-16)
Journal of Network and Computer Applications 37 (2014) 216–228
data can be directly exchanged between the mobile devices people
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 2 7 6 4 4 4 3
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
2012 Third International Conference on Networking and Distributed Computing
Routing in Vehicular Ad Hoc
Optimized Node Selection Process for Quality of
Telecommun Syst
Telecommun Syst
S systems for VANET The examples of the previous section
Chapter 2
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of
Downloaded form http://iranpaper.ir
Figure 2.11 and Figure 2.12 illustrates an example of how circuit-switching flow
BIG DATA, CLOUD & MOBILE COMPUTING
BIG DATA, CLOUD & MOBILE COMPUTING
Novell IPX Configuration Examples
Novell IPX Configuration Examples
A Study on Local Repair Routing Algorithm based on
A Study on Local Repair Routing Algorithm based on
Initial Design First we describe our Content Addressable Network in
Initial Design First we describe our Content Addressable Network in
T. Wang et al.: Rethinking the Data Center Networking
Available online at www.sciencedirect.com
Partition of a network in to different isolated regions can
INTEGRATION, the VLSI journal 52 (2016) 41–50
LOFT: A low-overhead fault-tolerant routing scheme for 3D NoCs
LOFT: A low-overhead fault-tolerant routing scheme for 3D NoCs
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
HASHEM EIZAetal.: SITUATION-AWARE QoS ROUTING ALGORITHM FOR VANETs 5523
HASHEM EIZAetal.: SITUATION-AWARE QoS ROUTING ALGORITHM FOR VANETs 5523
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TC.2016.2532871, IEEE
4 1
are great candidates for large NoCs especially when these between the advantages and disadvantages of vertical in-
4 3
8� 8� 2 = 128. Also, the total number of TSVs,jTj, is equal
4 9
Fig. 11: Performance under shuffle traffic for 5 TSVs
Fig. 18: Performance under table-based traffic with five TSVs
8 CONCLUSION
Resource-aware clustering based routing protocol in
Wireless Netw (2016) 22:723–740
existing multicast routing algorithms for MANETs cannot be directly applied
Geographic Load Balancing Routing in Hybrid
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
2016 Annual Conference on Information Science and Systems (CISS)
Available online at www.sciencedirect.com
CoRoute: A New Cognitive Anypath Vehicular
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Journal of Network and Computer Applications
Available online at www.sciencedirect.com
Abstract Wireless Networks are becoming popular due to the concept
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Design and Implementation of Dynamic
Available online at www.sciencedirect.com
Downloaded from http://iranpaper.ir
Topology control of tactical wireless sensor networks using energy efficient
Optimization of Forest Vehicle Routing Using
Optimization of Forest Vehicle Routing Using
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Lookup Interface
Design and Implementation of Dynamic
This article was downloaded by: [Florida Atlantic University]
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
14th Intl Conf on Pervasive Intelligence 2016 IEEE 14th Intl
Engineering Applications of Artificial Intelligence 33 (2014) 127–140
Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 – 08 March, 2014
Journal of Network and Computer Applications 66 (2016) 198–213
Downloaded from http://comjnl.oxfordjournals.org/ at Northeastern University Libraries on October 10, 2014
1
Computers and Electrical Engineering 41 (2015) 357–367
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
Most traffic in sensor networks canbe classified into one of
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI Downloaded from http://iranpaper.ir
www.masdoc.ir
Downloaded from http://iranpaper.ir
A Performance Comparison of
2013 IEEE Military Communications Conference 2013 IEEE Military Communications Conference
COMPUTER SCIENCE REVIEW ( ) –
Wirele SS
Lookup Interface
Lookup Interface
Lookup Interface
2015 Intl. Conference on Computing and Network Communications (CoCoNet'15), Dec. 16-19, 2015, Trivandrum, India
Lookup Interface
Routing Protocols in Vehicular Ad Hoc Networks: A
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications;
Lookup Interface
2015 Intl. Conference on Computing and Network Communications (CoCoNet'15), Dec. 16-19, 2015, Trivandrum, India
ARTICLE IN PRESS
Computers & Operations Research 77 (2017) 86–95
Intelligent Information Management, 2012, 4, 66-74
World Academy of Science, Engineering and Technology
Abstract Network lifetime improvement and uncertainty inmultiple systems are the
Vehicle Routing Problem
ARTICLE IN PRESS
ARTICLE IN PRESS
ARTICLE IN PRESS
Clustering in Wireless Sensor Networks: Performance Comparison of
World Academy of Science, Engineering and Technology
World Academy of Science, Engineering and Technology
DTN routing Traditional routing assumes that protocols somehow manage to
LBRR: Load Balanced Ring Routing Protocol for
Unicast Routing The Bundle protocol does not define any method
Unicast Routing The Bundle protocol does not define any method
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
Downloaded from http://iranpaper.ir
Available online at www.sciencedirect.com
A Penalized Best-Response Algorithm for Nonlinear
Downloaded from http://iranpaper.ir
A Survey Recent technological advances in the area of wireless
Wireless Netw
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
Cluster Comput
GPSR: Greedy Perimeter Stateless Routing for Wireless
node
2017 9th IEEE International Conference on Communication Software and Networks
ارائه ی مسیریابی و کیفیت سرویس در شبکه نرم افزار محور
الگوریتم مسیریابی مبتنی بر کیفیت (QOS Routing) در شبکه های نرم افزار محور (SDN)
Motivation The main objective of our work is to add
May 2015, Volume 2, Issue 5 JETIR (ISSN-2349-5162)
2524 IEEE COMMUNICATIONS LETTERS, VOL. 21, NO. 11, NOVEMBER 2017
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ARTICLE IN PRESS
1
2
3
1
2
3
Motivation The main objective of our work is to add
Downloaded from http://iranpaper.ir
Milk distribution and safety is of high concern as it
Available online at www.sciencedirect.com
Computers and Electrical Engineering 67 (2018) 96–113
Accepted Manuscript
2017 ACM/IEEE Symposium on Architectures for Networking and Communications 2017 ACM/IEEE Symposium on Architectures for Networking and Communications 2017 ACM/IEEE Symposium on Architectures for Networking and Communications
2017 ACM/IEEE Symposium on Architectures for Networking and Communications 2017 ACM/IEEE Symposium on Architectures for Networking and Communications 2017 ACM/IEEE Symposium on Architectures for Networking and Communications
Source Ports Ports reachable Ports reachable
thus requires no buffering. Although Eclipse++ only uses buffered
Technique Description
Contents
Received September 1, 2017, accepted October 8, 2017, date of publication October 11, 2017, date of current version February 1, 2018.
Whale Optimization Algorithm for Routing in Internet of Things to
HindawiPublishingCorporation
Hossein Karimisharif
Luna Azul ISSN 1909-2474 No. 42, enero - junio 2016
Downloaded from https://iranpaper.ir
Journal of trends in Computer Science and Smart technology (TCSST) (2020)
S. Vijaya Kumar et al, International Journal of Computer Science and Mobile Computing Vol.2 Issue. 11, November- 2013, pg. 139-145
Expert Systems With Applications 210 (2022) 118477
Peer-to-Peer Networking and Applications
Peer-to-Peer Networking and Applications