Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 2
- Moral and ethical aspects 2
- African literature 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- CRAFTS & HOBBIES / Pottery & Ceramics 1
- CRAFTS & HOBBIES / Reference 1
- Constitutional law 1
- Delivery of Health Care 1
- Derecho de familia 1
- Diagnostic Imaging 1
- Domestic relations 1
- Economic policy 1
- Ego (Psychology) 1
- History and criticism 1
- Imaging 1
- Journalistic ethics 1
- Magnetic Resonance Imaging 1
- Mental Health 1
- Nursing 1
- Osteoarthritis 1
- Photojournalism 1
- Potters' wheels 1
- Pottery 1
- Proposal Writing 1
- Psychiatric Nursing 1
- Psychological aspects 1
- Public health 1
- Social policy 1
- Technique 1
-
2501
Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia
Published 2023-06-01“…In order to mitigate the problems and to improve the provision of correctional service education, possible suggestions are forwarded. …”
Get full text
Article -
2502
High-Bandwidth Chiplet Interconnects for Advanced Packaging Technologies in AI/ML Applications: Challenges and Solutions
Published 2024-01-01“…To avoid power overhead, the chiplet interconnect architecture is designed to be as simple as possible, employing a parallel data bus with forwarded clocks. However, achieving highyield manufacturing and robust performance still necessitates significant efforts in design and technology co-optimization. …”
Get full text
Article -
2503
Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol
Published 2012-01-01“…The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmenting the Join Query packets with additional information such as speed, power level of node, and link bandwidths. …”
Get full text
Article -
2504
An Energy-Efficient MAC Protocol Employing Dynamic Threshold for Wireless Sensor Networks
Published 2012-10-01“…Here the packets are stored in the buffer, and then transmitted when the number of packets in the buffer exceeds the threshold dynamically decided according to the number of hops of the node from the source in the path of packet forwarding. The simulation results using OMNnet++ show that DT-MAC enables significant improvement in energy consumption compared to the existing MAC protocols. …”
Get full text
Article -
2505
Research on Load Balancing and Caching Strategy for Central Network
Published 2022-01-01“…In addition, by analyzing the cache management strategy and its impact on the performance of the network system, a cache node information forwarding model with resource requests as the object in the central network environment was given. …”
Get full text
Article -
2506
Efficient Data Transmission for Community Detection Algorithm Based on Node Similarity in Opportunistic Social Networks
Published 2021-01-01“…When dividing communities, we use mobile edge computing to combine network topology attributes with social attributes. When forwarding the message, we select optimal relay node as transmission according to the coefficients of channels. …”
Get full text
Article -
2507
Non-GPS Data Dissemination for VANET
Published 2014-01-01“…This requires a broadcasting protocol which has efficient forwarder nodes and an efficient broadcasting mechanism. …”
Get full text
Article -
2508
La peinture sur lave émaillée des façades des églises parisiennes du xixe siècle : une expérience de réintroduction de la polychromie
Published 2019-06-01“…The study focuses on the six Paris churches with decoration painted on enamelled lava on the façade: Saint-Vincent-de-Paul, which to this day remains the best-known decoration in terms of its importance and history, La Sainte-Trinité, Saint-Augustin, Saint-Ambroise, Saint-Laurent and Saint-Joseph-des-Nations.Hypotheses have been put forwards as to the possible reasons, both technical and with regards to changing taste, which plunged the attempt to reintroduce polychromy on the façades of nineteenth-century Parisian churches in obscurity, until 1998, the year of the exhibition at the Musée de la Vie Romantique of the enamelled lavas of the church of Saint-Vincent-de-Paul.…”
Get full text
Article -
2509
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks
Published 2015-07-01“…A centralized solution can detect and adaptively counter FEIAs while conserving the energy of the forwarding nodes because it does not make the nodes verify reports using cryptographic operations. …”
Get full text
Article -
2510
An active detection of compromised nodes based on en-route trap in wireless sensor network
Published 2021-08-01“…Most of current en-route filtering schemes could filter false data effectively; however, the compromised nodes could take use of the filtering scheme to launch Fictitious False data Dropping attack, the detection of this attack is extremely difficult since the previous hop node is unable to distinguish whether the forwarding node dropt a false data report with incorrect Message Authentication Codes or a legitimate report. …”
Get full text
Article -
2511
Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment
Published 2015-02-01“…Most routing algorithms employ a paradigm by which a node can keep the receiving messages, carrying the messages with them when moving and then forwarding the messages to the opportunistic meeting nodes when possible. …”
Get full text
Article -
2512
An advertisement dissemination strategy with maximal influence for Internet-of-Vehicles
Published 2019-11-01“…In this problem, advertisements will be first sent to a selected set of seed vehicles, then forwarded to neighboring vehicles. To find the influential set of vehicles, we examine the probability of interaction between vehicles by exploiting their mobility. …”
Get full text
Article -
2513
Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay
Published 2022-01-01“…In the second stage, the relay decodes and forwards the covert information received in the first stage; at the same time, the relay uses zero-forcing beamforming to send interference signals to the warden to ensure covert transmission. …”
Get full text
Article -
2514
A Probabilistic Protocol for Multihop Routing in VANETs
Published 2010-01-01“…The proposed new protocol for multihop communication refers to a lookup table containing the precomputed data to decide a good packet forwarder quickly. We create a simulation testbed that seems challenging for all the existing multihop routing protocols for VANETs, in which we test ours. …”
Get full text
Article -
2515
ASSESSING THE SYNERGETIC EFFECT OF SELECTING THE OPTIMAL STRUCTURE OF A LOGISTICS CHAIN
Published 2024-09-01“…These stakeholders include freight owners, who initiate the delivery process, forwarders who manage and optimize deliveries, carriers who physically transport goods, and freight terminals that facilitate cargo handling and storage. …”
Get full text
Article -
2516
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
Published 2015-01-01“…Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. …”
Get full text
Article -
2517
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge
Published 2013-04-01“…The source packet is randomly forwarded within and between the groups with elaborate design to ensure communication anonymity; furthermore, members of each group exchange encrypted traffic of constant packet length to make it difficult for the adversary to trace back. …”
Get full text
Article -
2518
Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks
Published 2014-07-01“…Simulation results show that proposed scheme outperforms minimum hop routing and greedy forwarding in terms of network lifetime, data packet latency, and load balance while maintaining comparable throughput.…”
Get full text
Article -
2519
Efficient IP address retrieval using a novel octet based encoding technique for high speed lookup to improve network performance
Published 2025-01-01“…IP lookup is a critical task used to find the next hop address by searching for the longest prefix match in the forwarding information base (FIB). The binary trie is one of the most popular software-based approaches for IP lookup. …”
Get full text
Article -
2520
CC2: Defending Hybrid Worm on Mobile Networks with Two-Dimensional Circulation Control
Published 2019-01-01“…We also design an efficient worm signature forwarding strategy that enables most nodes in the network to reach an immune state before being infected by the worm. …”
Get full text
Article