Results 81 to 90 of about 394,319 (285)

Compress-and-Forward for Relay Broadcast Channels without Common Messages

open access: yesCybernetics and Information Technologies, 2015
This paper is connected with compress-and-forward strategy for two-user relay broadcast channels without common messages, where the relay node has private messages from the source, in addition to aiding traditional communication from the source to the ...
Song Xiaoxia, Li Yong
doaj   +1 more source

Proximity to bait and social interactions influence individual wild pig (Sus scrofa) visitation at bait sites

open access: yesThe Journal of Wildlife Management, EarlyView.
Individual wild pig bait site visitation and time to initial detection is primarily influenced by space use (i.e., proximity to bait) and whether wild pigs from other social groups visited before. Specifically, females are less likely to visit a bait site if an adult male visits a site before them.
Sydney M. Brewer   +2 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

A Novel Method to Enable the Awareness Ability of Non-V2V-Equipped Vehicles in Vehicular Networks

open access: yesSensors, 2019
Autonomous vehicles need to have sufficient perception of the surrounding environment to produce appropriate driving behavior. The Vehicle-to-Vehicle (V2V) communication technology can exchange the speed, position, direction, and other information ...
Jian Wang   +4 more
doaj   +1 more source

PCODE: an efficient and reliable collective communication protocol for unreliable broadcast domain [PDF]

open access: yes, 1995
Existing programming environments for clusters are typically built on top of a point-to-point communication layer (send and receive) over local area networks (LANs) and, as a result, suffer from poor performance in the collective communication part. For
Bruck, Jehoshua   +4 more
core  

From Niche to Mainstream: A Knowledge Exchange Model for Sustainable Housing Adoption

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT As climate change intensifies the demand for sustainable practices, the residential housing sector remains a critical yet underutilized area for promoting energy efficiency. Although consumer awareness is increasing, sustainable and energy‐efficient (SEE) housing continues to occupy a niche market.
Lianne Foti
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

God's Presence in the Aisle: How God Salience Encourages Preference for Ultra‐Processed Foods

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT God‐related cues are pervasive in consumers' daily lives, yet little research has examined how God salience shapes consumer food choices. Drawing on compensatory control theory and the literature on symbolic healing, we present findings from six studies, including a field experiment, demonstrating that high (vs.
Ali Gohary, Hean Tat Keh
wiley   +1 more source

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

Free Side-channel Cross-technology Communication in Wireless Networks

open access: yes, 2017
Enabling direct communication between wireless technologies immediately brings significant benefits including, but not limited to, cross-technology interference mitigation and context-aware smart operation.
He, Tian   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy