message mechanism
Recently Published Documents


TOTAL DOCUMENTS

14
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Repositor ◽  
2020 ◽  
Vol 2 (1) ◽  
pp. 79
Author(s):  
Rino Nugroho ◽  
Mahar Faiqurahman ◽  
Zamah Sari

Wireless Sensor Network (WSN) is a wireless network consisting of one or more nodes even numbering thousands. The nodes in the wireless sensor network (WSN) consist of sensor nodes and sink nodes. The use of wireless sensors on the network can form a node that can communicate with each other. The communication process generally uses a pull mechanism that precedes the data query process from the node to node sensor that provides sensing data. In some wireless sensor node architecture, this pull mechanism is considered less effective because the node sink must first request data to the sensor node. Alternative, a push message mechanism can be used to transmit sensed data within specified or determined time intervals.In this research is implemented push message mechanism by using restful web service in wireless sensor communications. Test results on the delivery of data by push data transmission obtained to sink nodes alternately in accordance with the order of destination address listed or stored in memory sensor node. And in doing data delivery to be efficient in the absence of data requests at any time.


2016 ◽  
pp. 568-590
Author(s):  
Kumar Ramakrishna

Based on the assumption that ideology is the centre of gravity of a violent Islamist terrorist network, this chapter proposes a Counter-Ideological Response (CIR) Model for countering violent extremism (CVE) in Southeast Asia. The Model seeks to gradually diminish the appeal of violent extremist ideology. It comprises of five conceptual Spaces of Sender, Message, Mechanism, Recipient and Context, within which ideology-relevant policy interventions may be attempted, so as to impact the overall reach and appeal of the violent extremist narrative vis-a-vis any countervailing narrative put out against it. The model is applied to the Indonesian CVE milieu in this chapter.


Author(s):  
Kumar Ramakrishna

Based on the assumption that ideology is the centre of gravity of a violent Islamist terrorist network, this chapter proposes a Counter-Ideological Response (CIR) Model for countering violent extremism (CVE) in Southeast Asia. The Model seeks to gradually diminish the appeal of violent extremist ideology. It comprises of five conceptual Spaces of Sender, Message, Mechanism, Recipient and Context, within which ideology-relevant policy interventions may be attempted, so as to impact the overall reach and appeal of the violent extremist narrative vis-a-vis any countervailing narrative put out against it. The model is applied to the Indonesian CVE milieu in this chapter.


2013 ◽  
Vol 380-384 ◽  
pp. 1834-1837
Author(s):  
Yu Man Lin ◽  
Hao Rao

Currently Gobang online game is not perfect, the most important problem is the man-machine play and online play can not be implemented together. In order to solve the problem, a Gobang online game was developed which could be not only a man-machine game, but also an online game. The message mechanism was designed to manage messages from network. And the overall system architecture and the main algorithms were described accordingly.


2012 ◽  
Vol 157-158 ◽  
pp. 1340-1345 ◽  
Author(s):  
Yuan Yuan Shang ◽  
Zhou Wan ◽  
Xue Hua Zhang ◽  
Zhong Guo Jing ◽  
Xin Xiong

In order to solve time synchronization problem of wireless sensor network, combined with the broadcast characteristics of wireless transmission and bi-directional message mechanism and the characteristics of clustering network, this paper presents an improved time synchronization algorithm HLTN based on clustering network and the simulation experiment by NS-2 simulation platform and analyzed the results.


Sign in / Sign up

Export Citation Format

Share Document