-
1
A survey on fault detection for networked systems under communication constraints
Published 2025-12-01“…Next, for the NSs constrained by communication protocols, the corresponding FD methods are recalled. …”
Get full text
Article -
2
-
3
Secure Internet of Things Device with Single-Channel Communication for Resource-Constrained Applications
Published 2025-02-01Get full text
Article -
4
Wireless Sensor Networks: From Fundamentals and Applications to Innovations and Future Trends
Published 2025-01-01Get full text
Article -
5
PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications
Published 2014-07-01“…However, due to the resource constraints and heterogeneous characteristics of the devices, traditional authentication and key management schemes are not effective for such applications. …”
Get full text
Article -
6
Distributed decision making for unmanned aerial vehicle inspection with limited energy constraint
Published 2024-12-01“…The unsatisfactory energy density of the state-of-art batteries imposes constraints on the practical application of unmanned aerial vehicles (UAVs). …”
Get full text
Article -
7
Piecewise Adaptive Sliding Mode Control for Aeroengine Networked Control Systems with Resource Constraints
Published 2019-01-01“…Within the future application of wireless network for the aeroengine control problem, resource constraints (caused by the limitation of hardware) and network traffic restriction must be considered as one of the difficulties to be solved; thus, the network connection and transmission efficiency can be ensured. …”
Get full text
Article -
8
-
9
Managing incidental findings in total body PET/CT studies: balancing ethical considerations and resource constraints
Published 2025-05-01“…While this technology expands the capabilities of PET imaging for both research and clinical applications, it also introduces significant ethical and operational challenges, particularly in the management of incidental findings. …”
Get full text
Article -
10
Optimizing Vancomycin Soaking Protocols for Anterior Cruciate Ligament Reconstruction
Published 2025-03-01Get full text
Article -
11
Comparing New Wireless Sensor Network Protocols through Simulation and Data Analysis
Published 2024-04-01“…However, distinct applications with unique constraints in their nature make it more difficult for such resource-constrained networks to meet application objectives. …”
Get full text
Article -
12
Two-Time Weak-Measurement Protocol for Ergotropy Protection in Open Quantum Batteries
Published 2025-06-01“…In this paper, we propose a protocol that employs selective weak measurements to protect quantum states from such influence and mitigate battery discharging and that is feasible in state-of-the-art technologies. …”
Get full text
Article -
13
A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks
Published 2013-04-01“…In order to demonstrate the protocol is verifiably secure and trustworthy, a formal verification of the AGKA protocol is carried out. …”
Get full text
Article -
14
A New Real-Time and Guaranteed Lifetime Protocol in Wireless Sensor Networks
Published 2014-05-01“…Real-time applications are time and event critical, therefore they have strict constraint on delay, packet loss, and energy consumption in many wireless sensor networks (WSNs) scenarios, which demands the network to continue QoS operations for a preconfigured lifetime. …”
Get full text
Article -
15
Prescribed-Time Cooperative Output Regulation by Bounded Observer-Based Time-Varying Protocols
Published 2025-01-01“…This research focuses on the prescribed-time cooperative output regulation problem within linear multi-agent systems subject to input constraints. The key contribution is the design of a distributed observer-based bounded time-varying state controller and an output feedback protocol. …”
Get full text
Article -
16
Latency and energy-efficient multi-hop routing protocol for unmanned aerial vehicle networks
Published 2019-08-01“…The proposed routing protocol is topology aware and can be used for low-latency and high-mobility applications. …”
Get full text
Article -
17
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
Published 2025-03-01Get full text
Article -
18
Trust-based energy-efficient routing protocol for Internet of things–based sensor networks
Published 2020-10-01“…Internet of things grew swiftly and many services, software, sensors-embedded electronic devices and related protocols were developed and still in progress with full swing. …”
Get full text
Article -
19
Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol
Published 2025-07-01“…The protocol consists of two validation phases: an edge validation phase, where transactions undergo preliminary conflict detection and prioritization based on their temporal constraints, and a cloud validation phase, where a final conflict resolution mechanism ensures transactional correctness on a global scale. …”
Get full text
Article -
20
An Efficient In Vitro Regeneration Protocol and the Feature of Root Induction with Phloroglucinol in <i>Paeonia ostii</i>
Published 2024-11-01“…This study reports an efficacious protocol for <i>P. ostii</i> micropropagation, focusing on in vitro root development facilitated through the application of phloroglucinol (PG). …”
Get full text
Article