Results 31 to 40 of about 633,009 (149)
Black Women in the Labor Movement: Interviews with Clara Day & Johnnie Jackson [PDF]
[Excerpt] Labor unions, like all other institutions in our society, have participated in the racial and sexual discrimination which has made life so difficult for blacks and women. Yet black women are among the strongest and most consistent supporters of
core +1 more source
On gravitational-wave echoes from neutron-star binary coalescences
A tentative detection of gravitational-wave echoes in the post-merger signal of GW170817 has been recently claimed at $4.2\sigma$ significance level. It has been speculated that the signal might provide evidence for near-horizon quantum structures in the
Ferrari, Valeria, Pani, Paolo
core +1 more source
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed+2 more
core +1 more source
Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks
In this paper, we design and implement an Efficient and Lightweight Intrusion Detection (ELID) framework based on a new detection technique. This later relies on the fact that nodes that are located within the same cluster have almost a similar behavior.
Hichem Sedjelmaci, Sidi-Mohammed Senouci
semanticscholar +1 more source
Lunar Mass Black Holes from QCD Axion Cosmology [PDF]
In the QCD axion scenario, a network of domain walls bounded by cosmic strings fragments into pieces. As these fragments collapse, some of them will form black holes. With standard QCD axion parameters, the black holes will have lunar masses ($M_{\rm bh} \sim 10^{-8}\, {\rm M}_\odot$).
arxiv
An Authentication Protocol for Future Sensor Networks
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user ...
Bilal, Muhammad, Kang, Shin-Gak
core +1 more source
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate data dissemination in opportunistic networks, there is an implicit ...
Ling-Jyh Chen+2 more
semanticscholar +1 more source
The tidal deformability of a self-gravitating object leaves an imprint on the gravitational-wave signal of an inspiral which is paramount to measure the internal structure of the binary components.
Maselli, Andrea, Pani, Paolo
core +1 more source
Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks [PDF]
In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node.
arxiv
Kretschmann Scalar for a Kerr-Newman Black Hole [PDF]
I have derived the Kretschmann scalar for a general black hole of mass m, angular momentum per unit mass a, and electric charge Q. The Kretschmann scalar gives the amount of curvature of spacetime, as a function of position near (and within) a black hole.
arxiv +1 more source