Results 61 to 70 of about 3,331,180 (402)

Grid Deployment Scheme for Enhancing Network Performance in Underwater Acoustic Sensor Networks

open access: yesIEEE Access, 2023
Researchers have achieved significant progress on the problem of Sensor Node Deployment (SND) in Underwater Acoustic Sensor Networks (UASNs) in terms of enhancing underwater communication.
Ahmed Aljughaiman
doaj   +1 more source

Network Restoration for Next-Generation Communication and Computing Networks [PDF]

open access: yesJournal of Computer Networks and Communications, 2018
Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the ...
Bodhaswar T. Maharaj   +3 more
openaire   +4 more sources

Mobility-aware QoS assurance in software-defined radio access networks: an analytical study [PDF]

open access: yes, 2015
Software-defined networking (SDN) has gained a tremendous attention in the recent years, both in academia and industry. This revolutionary networking paradigm is an attempt to bring the advances in computer science and software engineering into the ...
Bontozoglou, Andreas   +3 more
core   +2 more sources

Unlocking the potential of tumor‐derived DNA in urine for cancer detection: methodological challenges and opportunities

open access: yesMolecular Oncology, EarlyView.
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever   +1 more
wiley   +1 more source

Advancing Drone Operations through Lightweight Blockchain and Fog Computing Integration: A Systematic Review

open access: yesDrones
This paper presents a systematic literature review investigating the integration of lightweight blockchain and fog computing technologies to enhance the security and operational efficiency of drones. With a focus on critical applications such as military
Rawabi Aldossri   +2 more
doaj   +1 more source

Advances in Computing and Network Communications

open access: yes, 2021
The Fourth International Conference on Computing and Network Communications (CoCoNet’20) provided a forum for sharing original research outcomes and practical development experiences among experts in the emerging areas of computing and communications. The conference was organized by Vellore Institute of Technology (VIT), Chennai, India.
Sabu M. Thampi   +4 more
openaire   +2 more sources

Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren   +16 more
wiley   +1 more source

A Survey on Android Malware Detection Techniques Using Supervised Machine Learning

open access: yesIEEE Access
Android’s open-source nature has contributed to the platform’s rapid growth and its widespread adoption. However, this widespread adoption of the Android operating system (OS) has also attracted the attention of malicious actors who develop
Safa J. Altaha   +2 more
doaj   +1 more source

Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory

open access: yesIEEE Access, 2017
The protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite ...
Stefan Rass   +5 more
doaj   +1 more source

User-Driven Adaptive Sampling for Massive Internet of Things

open access: yesIEEE Access, 2020
Energy conservation techniques are crucial to achieving high reliability in the Internet of Things (IoT) services, especially in the Massive IoT (MIoT), which stringently requires cost-effective and low-energy consumption for battery-powered devices ...
Le Kim-Hung, Quan Le-Trung
doaj   +1 more source

Home - About - Disclaimer - Privacy