تحقیق یاب

مرکز دانلود انواع فایل های دانشجویی و دانش آموزی(تحقیق,پاورپوینت,پروژه,مقاله,فایل فلش و ...)

تحقیق یاب

مرکز دانلود انواع فایل های دانشجویی و دانش آموزی(تحقیق,پاورپوینت,پروژه,مقاله,فایل فلش و ...)

دانلود مقاله Attacks on Mobile Adhoc Networks: A Survey - انتشار 2014

International Journal of Research in Advent Technology, Vol.2, No.5, May 2014E-ISSN: 2321-9637 Er. Nitin Aggarwal1, Ms. Kanta Dhankhar2   Abstract-Due to recent developments in technology and uniquely distinct characteristics of MANETs, theapplicability of MANETs have become pervasive. As the applications are increasing, the vulnerability of thesenetworks against various attacks has been exposed. MANETs have not clearly and explicitly stated defensemechanisms, so attacker node can easily di ...

دانلود مقاله Performance of a Hybrid ARQ Scheme in CDMA Wireless Sensor Network - انتشار 2011

International Journal of Energy, Information and CommunicationsVol. 2, Issue 3, August 2011 U. DattaMember, IEEE, Dept. of E& I, CSIR-CMERI, Durgapur, Indiauma_datta58@yahoo.inD. Bharath KumarDept.of ECE, N.I.T Durgapur, Durgapur, Indiadbr_773@yahoo.comAmit Kumar BallDept. of E&I, CSIR-CMERI, Durgapur, Indiaamit.ball@yahoo.comS. KunduMember, IEEE, Dept.of ECE, N.I.T Durgapur, Durgapur, Indiasumitkundu@yahoo.com   AbstractThe paper evaluates the energy level performance of CDMA wirel ...

دانلود مقاله Empirical evaluation of a cloud computing information security governance framework انتشار 2015

Empirical Evaluation of a Cloud Computing Information Security GovernanceFramework   Information and Software Technology Volume 58, February 2015, Pages 44–57 Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina, HaralambosMouratidis Abstract Context: Cloud computing is a thriving paradigm that supports an efficient way to provide IT services by introducing on-demand services and flexible computing resources. However, significant adoption of cloud services is being hindered ...

دانلود مقاله A Study on Critical Analysis of Computational Offloading Frameworks for Mobile Cloud Computing انتشار 2015

Journal of Network and Computer Applications Volume 47, January 2015, Pages 47–60 Muhammad Shiraz*, Mehdi Sookhak, Abdullah Gani, Syed Adeel Ali Shah AbstractDespite of substantial technological advancements in the recent years, Smart Mobile Devices (SMDs) are still low potential computingdevices. Therefore, Mobile Cloud Computing (MCC) deploys computational offloading for augmenting SMDs. The contemporary ComputationalOffloading Frameworks (COFs) implement resources intensive procedures ...

دانلود مقاله A comparative study of packet combining based error recovery schemes for wireless networks انتشار 2014

Int. J. Ad Hoc and Ubiquitous Computing, Vol. 16, No. 3, 2014 Sheng-Shih Wang*, Pei-Chun Lee, Kan-Yen Linand Tzu-Chang Yeh Abstract: To provide reliable communications in wireless environments, two fundamental errorcontrol mechanisms, automatic repeat request (ARQ) and forward error correction (FEC) areproposed. However, the ARQ mechanism may suffer frequent retransmissions and the FECmechanism incurs bandwidth overhead. To reduce the number of retransmissions and supportefficient correction, pr ...

دانلود مقاله A packet error recovery scheme for vertical handovers mobility management protocols

A packet error recovery scheme for verticalhandovers mobility management protocolsPierre-Ugo Tournoux1,2, Emmanuel Lochin1,2, Henrik Petander3, J´erˆomeLacan41 CNRS ; LAAS ; 7 avenue du colonel Roche, F-31077 Toulouse, France2 Universit´e de Toulouse ; UPS, INSA, INP, ISAE ; LAAS ; F-31077 Toulouse, France3 NICTA, Australian Technology Park, Eveleigh, NSW, Australia4 ISAE ; 10 av. Edouard Belin - BP 54032 - 31055 Toulouse Cedex 4, France Abstract. Mobile devices are connecting t ...

دانلود مقاله SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks- انتشار 2014

Ad Hoc Networks Available online 14 October 2014 Jef Maerien⇑, Sam Michiels, Danny Hughes, Christophe Huygens, Wouter Joosen   AbstractWSNs are trending towards dynamic environments that enable multiple parties to concurrently deploy and exploit multiple applications on shared nodes. The node owners want to share their nodes’ capabilities in order to increase return on investment, provide value added services, and easily share sensor node services. These concepts drive an evolvi ...

دانلود مقاله A multipath routing protocol for wireless sensor network for mine security monitoring - انتشار 2010

Mining Science and Technology (China) Volume 20, Issue 1, January 2010, Pages 148–151   XIAO Shuo1,2,*, WEI Xueye2, WANG Yu2   Abstract: Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, aWireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillancewith a relatively low cost. In this study, an Energy-Based Multipath Routing (EBMR) protocol is proposed, wh ...

دانلود کتاب مفید شطرنج A Gnat May Drink: One Hundred Annotated Games of Chess from 1900 to 1999 - Jonathan Hinton

A Gnat May Drink One Hundred Annotated Games of Chess from 1900 to 1999  Jonathan Hinton مجوعه بازیهای زیبا و تفسیر شده شامل 100 بازی از قرن بیستم ازسال 1900 تا 1999 نامزد جایزه بهترین کتاب شطرنج سال 2013 فرمت : پی دی اف تعداد صفحات 491 زبان انگلیسی  با قابلیت کپی و چاپ صفحات "A beautiful annotated games collection - featuring one hundred games from the twentieth century - presented chronologically with one game per year. Indexed by opening name, player name and ECO code. ...

ترجمه مقاله: A "LEFT-MEADIAN" INTERPRETATION(تفسیری چپ از نظریه مید)

مترجم مقاله : سید یدالله امیرفخریان بخشی از محتوای مقاله : این مقاله نگاهی ویژه است به نظریه مید و نگارنده کوشیده تا با تحلیل‌های دقیق به کسانی که به نحوی نظریه او را مورد اشکال قرار می‌دهند پاسخ دهد.در این راستا ابتدا نظر لیچمن را مطرح می‌سازد که برداشتی ساکن(ایستا) از نظریه مید داشته و اعتقاد دارد که در نظریه او من مفعولی در برابر من فاعلی و جامعه در مقابل خود، وضعیت برتر داشته و در نتیجه وجود رابطه دیالکتیکی بین اجزای این نظریه را رد می‌کند ... ویژگی های این محصول : ...