Results 11 to 20 of about 1,052 (226)

The Impacts of Social Equity on Health

open access: yesHealth Equity, 2021
Terry Gerton: Those that are coming behind us have a different level of expectation. They are expecting us to be better and to do better, and they're not going to let us continue the status quo. Welcome to Management Matters, a National Academy of Public
doaj   +1 more source

Securing Mobile Adhoc Networks from Black-Hole Attacks [PDF]

open access: yes, 2021
MANETs are in-secure and vulnerable to attacks, as it lacks a central trusted authority. Providing security to such a network becomes an essential task and formulate the origin of the proposed work. The proposed system attempts to secure MANETs using route validation and cryptographic techniques. One of the most crucial, and primary concerns in today’s
Taranum, Fahmina   +1 more
openaire   +1 more source

Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm

open access: yesComplexity, 2017
The globalization of economy and market led to increased networking in the field of manufacturing and services. These manufacturing and service processes including supply chain became more and more complex.
Ágota Bányai   +2 more
doaj   +1 more source

Tensor network models of unitary black hole evaporation

open access: yesJournal of High Energy Physics, 2017
22 pages, 4 ...
Leutheusser, Samuel, Raamsdonk, Mark
openaire   +4 more sources

Communication Black Holes in Ground Segment Networks

open access: yesSpaceOps 2012 Conference, 2012
The ISS Columbus Ground Segment is a complex MPLS-based WAN communication network witch connects sites located in USA (NASA), Russia (RSA), France (ATV-CC), Germany (COL-CC) and several user centres across Europe (network consists of more than 17 sites).
Szücs, Gabor   +2 more
openaire   +2 more sources

Searching for a black hole in arbitrary networks [PDF]

open access: yesProceedings of the twenty-first annual symposium on Principles of distributed computing - PODC '02, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
DOBREV STEFAN   +3 more
openaire   +3 more sources

Black-hole evaporation from the perspective of neural networks [PDF]

open access: yesEPL (Europhysics Letters), 2018
We study the black-hole evaporation from the perspective of neural networks. We then analyze the evolution of the Hamiltonian, finding in this way the conditions under which the synapse connecting the neurons changes from gravitatory to inhibitory during the evaporation process.
openaire   +2 more sources

Searching for a Black Hole in Synchronous Tree Networks

open access: yesCombinatorics, Probability and Computing, 2007
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous tree network, assuming an upper bound on the time of any edge traversal by an agent.
Czyzowicz, J.   +3 more
openaire   +2 more sources

Intelligent black hole detection in mobile AdHoc networks

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2019
<div class="WordSection1"><p>Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it
Yaesr Khamayseh   +2 more
openaire   +2 more sources

Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks

open access: yes, 2010
In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node.
Baadache, Abderrahmane, Belmehdi, Ali
openaire   +2 more sources

Home - About - Disclaimer - Privacy