Results 71 to 80 of about 6,379,566 (372)
Applying Infinite Petri Nets to the Cybersecurity of Intelligent Networks, Grids and Clouds
Correctness of networking protocols represents the principal requirement of cybersecurity. Correctness of protocols is established via the procedures of their verification. A classical communication system includes a pair of interacting systems.
Dmitry A. Zaitsev +2 more
doaj +1 more source
Ion‐Electron Fusion Transparent Film for Interactive Soft Robotics
An ion‐electron fusion transparent film with stable conductivity, high optical transmittance, and a broad linear strain‐sensing range of up to 300% is developed, attributed to the synergistic effects of ion penetration and microcrack design. When applied to soft robots, this film imparts proprioceptive sensing and underwater visible light communication
Zhiqiu Ye +12 more
wiley +1 more source
Broadcast Time in Communication Networks
Broadcasting is the information dissemination process whereby a set of messages is transmitted from one member to all other members of a communication network. We model a communication network by a graph and place certain restrictions upon the broadcasting process.
openaire +3 more sources
ABSTRACT Smallholder farmers are reverting to traditional production methods due to the high opportunity costs and unintended consequences of new technologies. This study focuses on row planting technology, which is labor‐intensive and slow without mechanized operations.
Emmanuel Tetteh Jumpah +4 more
wiley +1 more source
Streaming musical en Spotify: ubicuidad entre géneros y estados de ánimo
A partir de la digitalización y la emergencia de Internet, la industria de la música atraviesa un proceso de transformación entre el modelo broadcasting y el networking.
Jimena Jáuregui
doaj +1 more source
Understanding Food Security Behaviors during the COVID-19 Pandemic in Thailand: A Review
The COVID-19 pandemic has impacted worldwide food security including in Thailand. This review aims to understand people’s behaviors with regard to promoting food security during the COVID-19 pandemic by covering three main cases at a community level: the
Sukanya Sereenonchai, Noppol Arunrat
doaj +1 more source
Performance evaluation of an efficient counter-based scheme for mobile ad hoc networks based on realistic mobility model [PDF]
Flooding is the simplest and commonly used mechanism for broadcasting in mobile ad hoc networks (MANETs). Despite its simplicity, it can result in high redundant retransmission, contention and collision in the network, a phenomenon referred to as ...
Abdulai, J. +3 more
core
Abstract Mobile technologies have become significant resources for crisis communication and social support in recent years. However, despite empirical evidence pointing to the centrality of these technologies for parenthood in everyday life, it is yet unknown how parents' coping resources play a role in the digital environment.
Daphna Yeshua‐Katz +2 more
wiley +1 more source
Distributed wireless network resource optimisation method based on mobile edge computing
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang +4 more
wiley +1 more source
Software Defi ned Satellite Network Assisted Multi-Domain Routing Strategy for Aeronautical Networks
Satellite network layer and aeronautical network layer are treated as important parts of the next generation network, which will lead the world into the era of global interconnection.However, the high mobility and sparse distribution of aircraft limit ...
Mo SHA +5 more
doaj +2 more sources

