Results 41 to 50 of about 625,191 (153)

Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Vehicular ad‐hoc networks (VANETs) support features like comfort, safety, and infotainment, enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large‐scale networks due to fixed policies and complex architectures, such as constantly changing vehicle positions.
Adi El‐Dalahmeh   +3 more
wiley   +1 more source

Nuclear receptors and endocrine disruptors in fetal and neonatal testes: a gapped landscape.

open access: yesFrontiers in Endocrinology, 2015
During the last decades, many studies reported that male reproductive disorders are increasing among humans. It is currently acknowledged that these abnormalities can result from fetal exposure to environmental chemicals that are progressively becoming ...
Virginie eRouiller-Fabre   +26 more
doaj   +1 more source

Induced chlorophyll mutations in Gloriosa superba

open access: yesElectronic Journal of Plant Breeding, 2021
The present experiment was carried out to study the spectrum of chlorophyll mutations, mutagenic effectiveness and efficiency in Gloriosa superba seeds using both chemical and physical mutagens.
S. Padmapriya* and K. Rajamani
doaj   +1 more source

De l’utilité de commettre des erreurs

open access: yesCanadian Urological Association Journal, 2012
L'article de Chung et al sur la discordance entre les ultrasons effectues dans un milieu communautaire ou hospitalier est remarquable de par les donnees sur la marge d'erreur. Les ultrasons se sont averes discordants pour les anomalies urogenitales importantes dans presque la moitie des cas lorsqu'ils ont ete effectues dans un contexte communautaire, c'
openaire   +3 more sources

Computational intelligence-based steganalysis comparison for RCM-DWT and PVA-MOD methods

open access: yesAutomatika, 2019
This research article proposes data hiding technique for improving the data hiding procedure and securing the data transmission with the help of contrast mapping technique along with advanced data encryption standard.
T. D. Sairam, K. Boopathybagan
doaj   +1 more source

Carbonatacion de pastas de cemento de aluminato de calcio

open access: yes, 2001
Peer ...
Fernández Carrasco, Lucía   +3 more
openaire   +4 more sources

Comparison of new RANS-LES hybrid methods on a tandem cylinder problem using rough meshes

open access: yesApplied and Computational Mechanics
Detached eddy simulation (DES), delayed DES (DDES) and improved DDES (IDDES) hybrid RANS-LES turbulence models based on the Menter’s Shear Stress Transport (SST) model as well as the DES variant of the Kok's Turbulent/Non-Turbulent model (TNT), Extra ...
Hájek L.   +3 more
doaj   +1 more source

FORECASTING OYSTER MUSHROOM SALES USING THE DOUBLE EXPONENTIAL SMOOTHING METHOD AT KUB RUMAH MUSHROOM BERSAMA

open access: yesJurnal Riset Informatika, 2022
The amount of oyster mushroom production is often not by consumer orders due to a lack of attention to the mushroom stock in the Mushroom House KUB.
Winda Wulandari   +2 more
doaj   +1 more source

Düşey Elektrik Sondajı Verilerinin Genelleştirilmiş Regresyon Sinir Ağları ile Ters Çözümü

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi
Düşey elektrik sondajı (DES) verilerinin ters çözümü doğrusal olmayan bir problem olması nedeniyle zor bir işlemdir. Bu çalışmada, genelleştirilmiş regresyon sinir ağlarının özdirenç problemine uygulanabilirliği araştırılmıştır.
Doğukan Durdağ, Ertan Pekşen
doaj   +1 more source

Numerical Simulation and Characteristic Analysis of Ship's Air Flow Field [PDF]

open access: yesXibei Gongye Daxue Xuebao, 2018
The air flow field of ship was simulated by using computational fluid dynamics technology to analyze its prime characteristics with reasonable accuracy.

doaj   +1 more source

Home - About - Disclaimer - Privacy