Results 21 to 30 of about 72,912 (169)

Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks [PDF]

open access: yes, 2015
© 2015 IEEE. Path length of a multi hop Ad Hoc networks has an adverse impact on the end-to-end throughput especially during network saturation. The success rate of forwarding packets towards destination is limited due to interference, contention ...
Ghita, B., Lancaster, D., Marchang, Jims
core   +1 more source

An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless and mobile sensor network technologies in M2M (machine to machine) are rapidly applied to our real life. Thus, in near future, advanced wireless and mobile sensor network in M2M application will be major key factor of the future generation ...
You-Boo Jeon   +3 more
doaj   +1 more source

Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks [PDF]

open access: yes, 2007
In this paper we revisit two classes of mobility models which are widely used to repre-sent users ’ mobility in wireless networks: Random Waypoint (RWP) and Random Direction (RD).
Garetto, M., Leonardi, Emilio
core   +3 more sources

A Secure and Efficient Certificateless Authentication Scheme With Unsupervised Anomaly Detection in VANETs

open access: yesIEEE Access, 2018
As the crucial component of intelligent transportation system, vehicular ad hoc networks (VANETs) are capable of providing a variety of safety-related functionalities and commercial-oriented applications, which significantly improves the driving ...
Haowen Tan, Ziyuan Gui, Ilyong Chung
doaj   +1 more source

A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS

open access: yesIngénierie des Systèmes d'Information, 2022
A Mobile Ad-Hoc Network (MANET) is a self-configuring network that provides temporary connections to several wireless nodes. Trust mechanisms are employed in routing protocols to quickly locate a safe path.
Rajesh Yamparala   +1 more
semanticscholar   +1 more source

Automated Meter Reading and SCADA Application for Wireless Sensor Network [PDF]

open access: yes, 2003
Currently, there are many technologies available to automate public utilities services (water, gas and electricity). AMR, Automated Meter Reading, and SCADA, Supervisory Control and Data Acquisition, are the main functions that these technologies must
Barbancho Concejero, Julio   +2 more
core   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Magnetoelectric Nanotherapy Achieves Complete Tumor Ablation and Prolonged Survival in Pancreatic Cancer Murine Models

open access: yesAdvanced Science, EarlyView.
Magnetoelectric nanoparticles (MENPs) serve as externally controlled, MRI‐activated theranostic agents for targeted cancer therapy by inducing electric field‐based ablation in solid tumors. MENPs enable simultaneous precise tumor ablation and MRI signal modulation, allowing real‐time treatment monitoring and prediction of therapeutic outcomes with no ...
John Michael Bryant   +28 more
wiley   +1 more source

Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks [PDF]

open access: yes, 2014
In a typical multihop Ad-Hoc network, interference and contention increase when flows transit each node towards destination, particularly in the presence of cross-traffic.
Ghita, B., Lancaster, D., Marchang, Jims
core   +1 more source

Home - About - Disclaimer - Privacy