Showing 2,501 - 2,520 results of 2,586 for search '"The Forward"', query time: 0.04s Refine Results
  1. 2501

    Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia by Genet Gelana Kabeta, S G Pretorius

    Published 2023-06-01
    “…In order to mitigate the problems and to improve the provision of correctional service education, possible suggestions are forwarded. …”
    Get full text
    Article
  2. 2502

    High-Bandwidth Chiplet Interconnects for Advanced Packaging Technologies in AI/ML Applications: Challenges and Solutions by Shenggao Li, Mu-Shan Lin, Wei-Chih Chen, Chien-Chun Tsai

    Published 2024-01-01
    “…To avoid power overhead, the chiplet interconnect architecture is designed to be as simple as possible, employing a parallel data bus with forwarded clocks. However, achieving highyield manufacturing and robust performance still necessitates significant efforts in design and technology co-optimization. …”
    Get full text
    Article
  3. 2503

    Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol by Alireza Shams Shafigh, Kamran Abdollahi, Marjan Kouchaki

    Published 2012-01-01
    “…The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmenting the Join Query packets with additional information such as speed, power level of node, and link bandwidths. …”
    Get full text
    Article
  4. 2504

    An Energy-Efficient MAC Protocol Employing Dynamic Threshold for Wireless Sensor Networks by Kyung Tae Kim, Hee Yong Youn

    Published 2012-10-01
    “…Here the packets are stored in the buffer, and then transmitted when the number of packets in the buffer exceeds the threshold dynamically decided according to the number of hops of the node from the source in the path of packet forwarding. The simulation results using OMNnet++ show that DT-MAC enables significant improvement in energy consumption compared to the existing MAC protocols. …”
    Get full text
    Article
  5. 2505

    Research on Load Balancing and Caching Strategy for Central Network by Zhi-hong Wang, A-liang Dong

    Published 2022-01-01
    “…In addition, by analyzing the cache management strategy and its impact on the performance of the network system, a cache node information forwarding model with resource requests as the object in the central network environment was given. …”
    Get full text
    Article
  6. 2506

    Efficient Data Transmission for Community Detection Algorithm Based on Node Similarity in Opportunistic Social Networks by Aizimaiti Xiaokaiti, Yurong Qian, Jia Wu

    Published 2021-01-01
    “…When dividing communities, we use mobile edge computing to combine network topology attributes with social attributes. When forwarding the message, we select optimal relay node as transmission according to the coefficients of channels. …”
    Get full text
    Article
  7. 2507

    Non-GPS Data Dissemination for VANET by Kulit Na Nakorn, Kultida Rojviboonchai

    Published 2014-01-01
    “…This requires a broadcasting protocol which has efficient forwarder nodes and an efficient broadcasting mechanism. …”
    Get full text
    Article
  8. 2508

    La peinture sur lave émaillée des façades des églises parisiennes du xixe siècle : une expérience de réintroduction de la polychromie by Josette Saint-Martin

    Published 2019-06-01
    “…The study focuses on the six Paris churches with decoration painted on enamelled lava on the façade: Saint-Vincent-de-Paul, which to this day remains the best-known decoration in terms of its importance and history, La Sainte-Trinité, Saint-Augustin, Saint-Ambroise, Saint-Laurent and Saint-Joseph-des-Nations.Hypotheses have been put forwards as to the possible reasons, both technical and with regards to changing taste, which plunged the attempt to reintroduce polychromy on the façades of nineteenth-century Parisian churches in obscurity, until 1998, the year of the exhibition at the Musée de la Vie Romantique of the enamelled lavas of the church of Saint-Vincent-de-Paul.…”
    Get full text
    Article
  9. 2509

    Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks by Hae Young Lee

    Published 2015-07-01
    “…A centralized solution can detect and adaptively counter FEIAs while conserving the energy of the forwarding nodes because it does not make the nodes verify reports using cryptographic operations. …”
    Get full text
    Article
  10. 2510

    An active detection of compromised nodes based on en-route trap in wireless sensor network by Jiang-Tao Wang, Zhi-Xiong Liu

    Published 2021-08-01
    “…Most of current en-route filtering schemes could filter false data effectively; however, the compromised nodes could take use of the filtering scheme to launch Fictitious False data Dropping attack, the detection of this attack is extremely difficult since the previous hop node is unable to distinguish whether the forwarding node dropt a false data report with incorrect Message Authentication Codes or a legitimate report. …”
    Get full text
    Article
  11. 2511

    Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment by Jiradett Kerdsri, Komwut Wipusitwarakun

    Published 2015-02-01
    “…Most routing algorithms employ a paradigm by which a node can keep the receiving messages, carrying the messages with them when moving and then forwarding the messages to the opportunistic meeting nodes when possible. …”
    Get full text
    Article
  12. 2512

    An advertisement dissemination strategy with maximal influence for Internet-of-Vehicles by Yanfei Lu, Zihan Zhao, Bowu Zhang, Qinghe Gao

    Published 2019-11-01
    “…In this problem, advertisements will be first sent to a selected set of seed vehicles, then forwarded to neighboring vehicles. To find the influential set of vehicles, we examine the probability of interaction between vehicles by exploiting their mobility. …”
    Get full text
    Article
  13. 2513

    Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay by Ling Yang, Weiwei Yang, Liang Tang, Liwei Tao, Xingbo Lu, Zhengyun He

    Published 2022-01-01
    “…In the second stage, the relay decodes and forwards the covert information received in the first stage; at the same time, the relay uses zero-forcing beamforming to send interference signals to the warden to ensure covert transmission. …”
    Get full text
    Article
  14. 2514

    A Probabilistic Protocol for Multihop Routing in VANETs by Junichiro Fukuyama

    Published 2010-01-01
    “…The proposed new protocol for multihop communication refers to a lookup table containing the precomputed data to decide a good packet forwarder quickly. We create a simulation testbed that seems challenging for all the existing multihop routing protocols for VANETs, in which we test ours. …”
    Get full text
    Article
  15. 2515

    ASSESSING THE SYNERGETIC EFFECT OF SELECTING THE OPTIMAL STRUCTURE OF A LOGISTICS CHAIN by Vitalii NAUMOV, Ihor TARAN, Zhumazhan ZHANBIROV, Batyrbek MUSSABAYEV, Zarina KONAKBAI

    Published 2024-09-01
    “…These stakeholders include freight owners, who initiate the delivery process, forwarders who manage and optimize deliveries, carriers who physically transport goods, and freight terminals that facilitate cargo handling and storage. …”
    Get full text
    Article
  16. 2516

    Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks by Hae Young Lee

    Published 2015-01-01
    “…Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. …”
    Get full text
    Article
  17. 2517

    An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge by Zhiqiang Ruan, Wei Liang, Decai Sun, Haibo Luo, Fanyong Cheng

    Published 2013-04-01
    “…The source packet is randomly forwarded within and between the groups with elaborate design to ensure communication anonymity; furthermore, members of each group exchange encrypted traffic of constant packet length to make it difficult for the adversary to trace back. …”
    Get full text
    Article
  18. 2518

    Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks by Saifullah Khalid, Ashraf Masood, Faisal Bashir Hussain, Haider Abbas, Abdul Ghafoor

    Published 2014-07-01
    “…Simulation results show that proposed scheme outperforms minimum hop routing and greedy forwarding in terms of network lifetime, data packet latency, and load balance while maintaining comparable throughput.…”
    Get full text
    Article
  19. 2519

    Efficient IP address retrieval using a novel octet based encoding technique for high speed lookup to improve network performance by Veeramani Sonai, Indira Bharathi, Sajjad Shaukat Jamal, Zaid Bassfar, Sameer Abdullah Nooh

    Published 2025-01-01
    “…IP lookup is a critical task used to find the next hop address by searching for the longest prefix match in the forwarding information base (FIB). The binary trie is one of the most popular software-based approaches for IP lookup. …”
    Get full text
    Article
  20. 2520

    CC2: Defending Hybrid Worm on Mobile Networks with Two-Dimensional Circulation Control by Hailu Yang, Deyun Chen, Guanglu Sun, Xiaoyu Ding, Yu Xin

    Published 2019-01-01
    “…We also design an efficient worm signature forwarding strategy that enables most nodes in the network to reach an immune state before being infected by the worm. …”
    Get full text
    Article