Results 21 to 30 of about 60,733 (163)

A Secure and Efficient Certificateless Authentication Scheme With Unsupervised Anomaly Detection in VANETs

open access: yesIEEE Access, 2018
As the crucial component of intelligent transportation system, vehicular ad hoc networks (VANETs) are capable of providing a variety of safety-related functionalities and commercial-oriented applications, which significantly improves the driving ...
Haowen Tan, Ziyuan Gui, Ilyong Chung
doaj   +1 more source

Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks [PDF]

open access: yes, 2007
In this paper we revisit two classes of mobility models which are widely used to repre-sent users ’ mobility in wireless networks: Random Waypoint (RWP) and Random Direction (RD).
Garetto, M., Leonardi, Emilio
core   +3 more sources

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

On the Catalyzing Effect of Randomness on the Per-Flow Throughput in Wireless Networks [PDF]

open access: yes, 2013
This paper investigates the throughput capacity of a flow crossing a multi-hop wireless network, whose geometry is characterized by general randomness laws including Uniform, Poisson, Heavy-Tailed distributions for both the nodes' densities and the ...
Ciucu, Florin, Schmitt, Jens
core   +4 more sources

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Automated Meter Reading and SCADA Application for Wireless Sensor Network [PDF]

open access: yes, 2003
Currently, there are many technologies available to automate public utilities services (water, gas and electricity). AMR, Automated Meter Reading, and SCADA, Supervisory Control and Data Acquisition, are the main functions that these technologies must
Barbancho Concejero, Julio   +2 more
core   +1 more source

Experimentation with MANETs of Smartphones

open access: yes, 2017
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective.
Aguiar, Ana   +3 more
core   +1 more source

3D Soft Hydrogels Induce Human Mesenchymal Stem Cells “Deep” Quiescence

open access: yesAdvanced Healthcare Materials, EarlyView.
Three‐dimensional soft hydrogels mimicking the bone marrow niche induce deep quiescence in human mesenchymal stem cells. Unlike 2D culture, 3D matrices halt proliferation, regulate cell‐cycle and quiescence markers, and downregulate mTORC1 signaling, preserving stem cell phenotype and therapeutic potential ex vivo.
David Boaventura Gomes   +11 more
wiley   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

Artificial Intelligence in Autonomous Mobile Robot Navigation: From Classical Approaches to Intelligent Adaptation

open access: yesAdvanced Intelligent Systems, EarlyView.
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy