Results 51 to 60 of about 89,127 (274)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles

open access: yes, 2019
Vehicular Ad-hoc Networks (VANET) enable efficient communication between vehicles with the aim of improving road safety. However, the growing number of vehicles in dense regions and obstacle shadowing regions like Manhattan and other downtown areas leads
Khan, Mohammad. S.   +3 more
core   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, EarlyView.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Ion‐Electron Fusion Transparent Film for Interactive Soft Robotics

open access: yesAdvanced Science, EarlyView.
An ion‐electron fusion transparent film with stable conductivity, high optical transmittance, and a broad linear strain‐sensing range of up to 300% is developed, attributed to the synergistic effects of ion penetration and microcrack design. When applied to soft robots, this film imparts proprioceptive sensing and underwater visible light communication
Zhiqiu Ye   +12 more
wiley   +1 more source

Peluang dan Tantangan Bisnis Televisi Lokal Paska Regulasi Televisi Berjaringan

open access: yesJurnal Komunikasi, 2016
The Act Number 32 about Broadcast had been established at 28 December 2002, but in fact, there are always any obstacles that impede the realization, particularly the vague regulation and policy. One of them is the policy about networking TV in Indonesia.
Wahyu Sudarmawan
doaj  

Performance evaluation of an efficient counter-based scheme for mobile ad hoc networks based on realistic mobility model [PDF]

open access: yes, 2008
Flooding is the simplest and commonly used mechanism for broadcasting in mobile ad hoc networks (MANETs). Despite its simplicity, it can result in high redundant retransmission, contention and collision in the network, a phenomenon referred to as ...
Abdulai, J.   +3 more
core  

Message and time efficient multi-broadcast schemes

open access: yes, 2013
We consider message and time efficient broadcasting and multi-broadcasting in wireless ad-hoc networks, where a subset of nodes, each with a unique rumor, wish to broadcast their rumors to all destinations while minimizing the total number of ...
Kowalski, Dariusz R.   +2 more
core   +2 more sources

Neural Network‐Based Permittivity Engineering of Magnetic Absorbers for Customizable Microwave Absorption

open access: yesAdvanced Science, EarlyView.
A neural network‐enabled permittivity engineering paradigm is introduced, transcending traditional trial‐and‐error design. By decoupling electromagnetic parameters and screening a high‐throughput feature space, an ultrathin (1.0 mm) magnetic absorber is inversely designed, experimentally achieving a superior and customizable 5.1 GHz bandwidth and ...
Chenxi Liu   +9 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

A Multimode Fusion-Based Aviation Communication System

open access: yesAerospace
This paper presents a new design for a multimode fusion communication system, aimed at tackling the complexities of modern aeronautical communication.
Jingyi Qian   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy