Results 81 to 90 of about 238,447 (346)
Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks [PDF]
A challenging aspect in open ad hoc networks is their resilience against malicious agents. This is especially true in complex, urban-scale scenarios where numerous moving agents carry mobile devices that create a peer-to-peer network without authentication. A requirement for the proper functioning of such networks is that all the peers act legitimately,
Bucur, Doina +3 more
openaire +1 more source
A UV‐crosslinkable soft anisotropic conductive film (ACF) provides high‐resolution, room‐temperature electrical interfacing. Upon UV exposure, azide crosslinkers within the ACF matrix form covalent bonds with a wide range of C–H‐containing materials, resulting in interfaces that are both mechanically durable and electrically reliable.
Jun Choi +7 more
wiley +1 more source
On Singularities and Black Holes in Combination-Driven Models of Technological Innovation Networks
It has been suggested that innovations occur mainly by combination: the more inventions accumulate, the higher the probability that new inventions are obtained from previous designs. Additionally, it has been conjectured that the combinatorial nature of innovations naturally leads to a singularity: at some finite time, the number of innovations should ...
Solé Vicente, Ricard, 1962- +2 more
openaire +6 more sources
The fundamental intricate couplings between electrolyte wetting and fracture evolution are investigated in large single‐crystal V2O5 samples using both experimental techniques and simulations. Both approaches reveal consistent fracture patterns and lithium distribution concentration maps influenced by the wetting mechanism.
Wan‐Xin Chen +6 more
wiley +1 more source
Modeling the complexity of elliptic black hole solution in 4D using Hamiltonian Monte Carlo with stacked neural networks [PDF]
Armin Hatefi +2 more
openalex +1 more source
Effect of Black Hole Attacks on Wireless Sensor Networks
Wireless sensor networks (WSNs) establish a new popular of ambient supervision with many latent packages. The environment of wireless sensor networks prone to different forms of attacks as networks are prepared in open and unsecured surroundings. This paper analyses the overall performance of AODV whilst attacked by black hole, through varying the ...
Sachin Lalar, . Monika, Arun Kumar Yadav
openaire +1 more source
Moisture‐Driven Hydrogel Power Source with Asymmetric Ion Adsorption for Flexible Electronics
A hydrogel‐based power source employing asymmetric ion‐adsorbing electrodes and moisture‐driven gradients is reported. This design enables continuous electricity generation for over 4000 minutes without significant decay and without requiring external input.
Zhaoyang Sun +9 more
wiley +1 more source
DPRAODV: A Dynamic Learning System Against Blackhole Attack In AODV Based MANET [PDF]
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design.
Raj, Payal N., Swadas, Prashant B.
core
A roll‐to‐roll exfoliation method is demonstrated that preserves the crystallographic alignment of anisotropic 2D materials over large areas, enabling scalable fabrication of directional electronic and optoelectronic devices. Abstract Anisotropic 2D materials such as black phosphorus (BP), GeS or CrSBr, exhibit direction‐dependent optical and ...
Esteban Zamora‐Amo +14 more
wiley +1 more source
Fangled Protocol for Black Hole Detection in Ad Hoc Networks [PDF]
Reeta Mishra
openalex +1 more source

