Results 231 to 240 of about 47,588 (323)
The configuration of WSN design parameters presents a formidable multi‐objective optimization challenge characterized by five competing objectives that exhibit complex interdependencies. Figure 1 illustrates a typical WSN deployment topology showing sensor nodes, cluster heads, coverage areas, and various network conditions including out‐of‐range ...
Sandeep Deshmukh +8 more
wiley +1 more source
Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks. [PDF]
Almuseelem W.
europepmc +1 more source
IMPROVING THE PERFORMANCE OF CONTENT CENTRIC NETWORK USING CACHE NODE LOCATION
R. Vasanthi, S. Chitra
openalex +2 more sources
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
ZBP-MM: Zone-based producer mobility management protocol in named data networking for Internet of Things. [PDF]
Rizwan S +5 more
europepmc +1 more source
Abstract Ecological restoration projects with diverse interest groups face the continual challenge of engaging values, goals and cultures that may vary greatly among partners. As part of an eco‐cultural, riparian restoration project led by the Northwestern Band of the Shoshone Nation, our research examines the instrumental, relational and intrinsic ...
Sarah Woodbury +3 more
wiley +1 more source
DNS-Sensor: A Sensor-Driven Architecture for Real-Time DNS Cache Poisoning Detection and Mitigation. [PDF]
Yu H +5 more
europepmc +1 more source
ABSTRACT Binary search trees (BSTs) are fundamental data structures whose performance is largely governed by tree height. We introduce a block model for constructing BSTs by embedding internal BSTs into the nodes of an external BST—a structure motivated by parallel data architectures—corresponding to composite permutations formed via Kronecker or ...
John Peca‐Medlin, Chenyang Zhong
wiley +1 more source
What is the nature of cache memory in Parids? A comment on Chettih et al. 2024. [PDF]
Smulders TV, Cheng S.
europepmc +1 more source

