Showing 1 - 20 results of 144 for search 'constraints application protocol', query time: 0.12s Refine Results
  1. 1

    A survey on fault detection for networked systems under communication constraints by Weilu Chen, Jun Hu, Zhihui Wu, Siteng Ma

    Published 2025-12-01
    “…Next, for the NSs constrained by communication protocols, the corresponding FD methods are recalled. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications by Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei Gurtov, Mika Ylianttila

    Published 2014-07-01
    “…However, due to the resource constraints and heterogeneous characteristics of the devices, traditional authentication and key management schemes are not effective for such applications. …”
    Get full text
    Article
  6. 6

    Distributed decision making for unmanned aerial vehicle inspection with limited energy constraint by Qi Wang, Haomin Zhu, Gang Pan, Jianguo Wei, Chen Zhang, Zhu Huang, Guowei Ling

    Published 2024-12-01
    “…The unsatisfactory energy density of the state-of-art batteries imposes constraints on the practical application of unmanned aerial vehicles (UAVs). …”
    Get full text
    Article
  7. 7

    Piecewise Adaptive Sliding Mode Control for Aeroengine Networked Control Systems with Resource Constraints by Bin Zhou, Shousheng Xie, Litong Ren, Lei Wang, Yu Zhang, Ledi Zhang, Hao Wang

    Published 2019-01-01
    “…Within the future application of wireless network for the aeroengine control problem, resource constraints (caused by the limitation of hardware) and network traffic restriction must be considered as one of the difficulties to be solved; thus, the network connection and transmission efficiency can be ensured. …”
    Get full text
    Article
  8. 8
  9. 9

    Managing incidental findings in total body PET/CT studies: balancing ethical considerations and resource constraints by Georgios I. Angelis, Katie Ockenden, Steven R. Meikle, Fernando Calamante

    Published 2025-05-01
    “…While this technology expands the capabilities of PET imaging for both research and clinical applications, it also introduces significant ethical and operational challenges, particularly in the management of incidental findings. …”
    Get full text
    Article
  10. 10
  11. 11

    Comparing New Wireless Sensor Network Protocols through Simulation and Data Analysis by Himanshu Agarwal, Atul Pratap Singh, Ajeet Singh, Amit Kumar, Pratik K. Agrawal, S. Saranya

    Published 2024-04-01
    “…However, distinct applications with unique constraints in their nature make it more difficult for such resource-constrained networks to meet application objectives. …”
    Get full text
    Article
  12. 12

    Two-Time Weak-Measurement Protocol for Ergotropy Protection in Open Quantum Batteries by André H.A. Malavazi, Rishav Sagar, Borhan Ahmadi, Pedro R. Dieguez

    Published 2025-06-01
    “…In this paper, we propose a protocol that employs selective weak measurements to protect quantum states from such influence and mitigate battery discharging and that is feasible in state-of-the-art technologies. …”
    Get full text
    Article
  13. 13

    A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks by Yue Li, Dehua Chen, Wei Li, Gaoli Wang, Paul Smith

    Published 2013-04-01
    “…In order to demonstrate the protocol is verifiably secure and trustworthy, a formal verification of the AGKA protocol is carried out. …”
    Get full text
    Article
  14. 14

    A New Real-Time and Guaranteed Lifetime Protocol in Wireless Sensor Networks by Babar Shah, Ki-Il Kim

    Published 2014-05-01
    “…Real-time applications are time and event critical, therefore they have strict constraint on delay, packet loss, and energy consumption in many wireless sensor networks (WSNs) scenarios, which demands the network to continue QoS operations for a preconfigured lifetime. …”
    Get full text
    Article
  15. 15

    Prescribed-Time Cooperative Output Regulation by Bounded Observer-Based Time-Varying Protocols by Jiaxin Zhou, Yuan Tian, Yan Li, Sidong Wu

    Published 2025-01-01
    “…This research focuses on the prescribed-time cooperative output regulation problem within linear multi-agent systems subject to input constraints. The key contribution is the design of a distributed observer-based bounded time-varying state controller and an output feedback protocol. …”
    Get full text
    Article
  16. 16

    Latency and energy-efficient multi-hop routing protocol for unmanned aerial vehicle networks by Abdelhamied A Ateya, Ammar Muthanna, Irina Gudkova, Yuliya Gaidamaka, Abeer D Algarni

    Published 2019-08-01
    “…The proposed routing protocol is topology aware and can be used for low-latency and high-mobility applications. …”
    Get full text
    Article
  17. 17
  18. 18

    Trust-based energy-efficient routing protocol for Internet of things–based sensor networks by Muhammad Ilyas, Zahid Ullah, Fakhri Alam Khan, Muhammad Hasanain Chaudary, Muhammad Sheraz Arshed Malik, Zafar Zaheer, Hamood Ur Rehman Durrani

    Published 2020-10-01
    “…Internet of things grew swiftly and many services, software, sensors-embedded electronic devices and related protocols were developed and still in progress with full swing. …”
    Get full text
    Article
  19. 19

    Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol by Mohammad A. Al Khaldy, Ahmad Nabot, Ahmad al-Qerem, Issam Jebreen, Abdulbasit A. Darem, Asma A. Alhashmi, Mohammad Alauthman, Amjad Aldweesh

    Published 2025-07-01
    “…The protocol consists of two validation phases: an edge validation phase, where transactions undergo preliminary conflict detection and prioritization based on their temporal constraints, and a cloud validation phase, where a final conflict resolution mechanism ensures transactional correctness on a global scale. …”
    Get full text
    Article
  20. 20

    An Efficient In Vitro Regeneration Protocol and the Feature of Root Induction with Phloroglucinol in <i>Paeonia ostii</i> by Keyuan Zheng, Luming Yao, Yumei Xie, Shuiyan Yu, Yonghong Hu, Mulan Zhu

    Published 2024-11-01
    “…This study reports an efficacious protocol for <i>P. ostii</i> micropropagation, focusing on in vitro root development facilitated through the application of phloroglucinol (PG). …”
    Get full text
    Article