Results 111 to 120 of about 3,331,180 (402)

Smart Virtualization Packets Forwarding During Handover for Beyond 5G Networks

open access: yesIEEE Access, 2019
Keeping a connection continuity during the movement of a mobile node (MN) between access points without any suspension of provided services is one of the most pressing issues should be solved.
Fouad Ali Yaseen, Hamed S. Al-Raweshidy
doaj   +1 more source

Analysis of Raindrop Shapes and Scattering Calculations: The Outer Rain Bands of Tropical Depression Nate

open access: yesAtmosphere, 2020
Tropical storm Nate, which was a powerful hurricane prior to landfall along the US Gulf coast, traversed north and weakened considerably to a tropical depression as it moved near an instrumented site in Hunstville, AL.
Merhala Thurai   +3 more
doaj   +1 more source

Моделирование сетевых конфигураций при изучении инфокоммуникационных технологий [PDF]

open access: yes, 2004
In clause experience o f use of technology of virtual machines VMWare Workstation in teaching discipline «Computer communications and networks» is ...
Соркина, В. Е.
core  

A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge

open access: yes, 2011
Establishment of pairwise keys between sensor nodes in a sensor network is a difficult problem due to resource limitations of sensor nodes as well as vulnerability to physical captures of sensor nodes by the enemy.
Das, Ashok Kumar
core   +1 more source

Measurement of computer communication networks [PDF]

open access: yes, 1976
Measures, tools, and techniques applicable to the performance measurement of computer communication networks are described for technicians who procure computer services from a remote access network. Cost considerations are discussed as a major component of evaluation, and measurement and evaluation methodologies are surveyed.
openaire   +1 more source

Critical Infrastructure Surveillance Using SecureWireless Sensor Networks

open access: yesJournal of Sensor and Actuator Networks, 2015
In this work, a secure wireless sensor network (WSN) for the surveillance, monitoring and protection of critical infrastructures was developed. To guarantee the security of the system, the main focus was the implementation of a unique security concept ...
Michael Niedermeier   +8 more
doaj   +1 more source

DNET: A communications facility for distributed heterogeneous computing [PDF]

open access: yes
This document describes DNET, a heterogeneous data communications networking facility. DNET allows programs operating on hosts on dissimilar networks to communicate with one another without concern for computer hardware, network protocol, or operating ...
Clayton, J.   +5 more
core   +1 more source

T2‐weighted imaging of rectal cancer using a 3D fast spin echo sequence with and without deep learning reconstruction: A reader study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose To compare image quality and clinical utility of a T2‐weighted (T2W) 3‐dimensional (3D) fast spin echo (FSE) sequence using deep learning reconstruction (DLR) versus conventional reconstruction for rectal magnetic resonance imaging (MRI).
Dan Nguyen   +11 more
wiley   +1 more source

Forensic Examination of Drones: A Comprehensive Study of Frameworks, Challenges, and Machine Learning Applications

open access: yesIEEE Access
Unmanned Aerial Vehicles (UAVs) have evolved into necessary assets across various sectors, motivating a need for strong controllability technologies in applications like flight path enhancement and avoiding obstacles.
Elhaam Abdulrahman Debas   +2 more
doaj   +1 more source

Telecommunications media for the delivery of educational programming [PDF]

open access: yes
The technical characteristics of various telecommunications media are examined for incorporation into educational networks. FM radio, AM radio, and VHF and UHF television are considered along with computer-aided instruction.
Ballard, R., Eastwood, L. F., Jr.
core   +1 more source

Home - About - Disclaimer - Privacy