Results 21 to 30 of about 1,589,033 (311)

A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks

open access: yesJournal of Intelligent Systems, 2017
Resource pooling in ad hoc networks deals with accumulating computing and network resources to implement network control schemes such as routing, congestion, traffic management, and so on.
Hegde Seema B.   +2 more
doaj   +1 more source

Design of multi-host communication protocol module of RS485 based on class token ring

open access: yesGong-kuang zidonghua, 2013
In view of problems of bad real-time performances, no plug-and-play function and low communication efficiency existed in poll calling mode of main control computer for communication nodes used by RS485 bus of current coal mine safety monitoring and ...
WANG Shu-feng   +3 more
doaj   +1 more source

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

open access: yesSensors, 2020
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily ...
Hichem Mrabet   +3 more
doaj   +1 more source

APPLICATION OF A PLC TO A LABORATORY COMPRESSOR WORKSHOP CONTROL SYSTEM [PDF]

open access: yesScientific Journal of Silesian University of Technology. Series Transport, 2016
In this paper a control system of air compressors in a university laboratory is presented. The control system, which is built using the Astraada RCC972 and the GE 90-20 drivers, is an extension of the two states’ inputs and outputs of Astraada.
Wojciech GÓRA   +2 more
doaj   +1 more source

Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard

open access: yesIEEE Access, 2022
Enhancing security, privacy, and interoperability of biometric networks and protocols has been a challenge for many research works for many years. The several proposed approaches still need to integrate these three characteristics while showing security ...
Eduardo Magalhaes De Lacerda Filho   +3 more
doaj   +1 more source

Modeling Pauli measurements on graph states with nearest-neighbor classical communication [PDF]

open access: yes, 2006
We propose a communication-assisted local-hidden-variable model that yields the correct outcome for the measurement of any product of Pauli operators on an arbitrary graph state, i.e., that yields the correct global correlation among the individual ...
Bryan Eastin   +6 more
core   +2 more sources

Streaming Communication Protocols [PDF]

open access: yesACM Transactions on Computation Theory, 2018
We define the Streaming Communication model that combines the main aspects of communication complexity and streaming. Input arrives as a stream, spread between several agents across a network. Each agent has a bounded memory, which can be updated upon receiving a new bit, or a message from another agent. We provide tight tradeoffs between the necessary
Boczkowski, Lucas   +2 more
openaire   +6 more sources

Quantum Repeater with Encoding [PDF]

open access: yes, 2008
We propose a new approach to implement quantum repeaters for long distance quantum communication. Our protocol generates a backbone of encoded Bell pairs and uses the procedure of classical error correction during simultaneous entanglement connection. We
J. M. Taylor   +7 more
core   +2 more sources

Application of Low-Cost Sensors for Building Monitoring: A Systematic Literature Review

open access: yesBuildings, 2021
In recent years, many scholars have dedicated their research to the development of low-cost sensors for monitoring of various parameters. Despite their high number of applications, the state of the art related to low-cost sensors in building monitoring ...
Behnam Mobaraki   +3 more
doaj   +1 more source

High-capacity quantum secure direct communication based on quantum hyperdense coding with hyperentanglement

open access: yes, 2011
We present a quantum hyperdense coding protocol with hyperentanglement in polarization and spatial-mode degrees of freedom of photons first and then give the details for a quantum secure direct communication (QSDC) protocol based on this quantum ...
Beige A   +17 more
core   +1 more source

Home - About - Disclaimer - Privacy