Results 21 to 30 of about 68,090 (251)

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

DRM Presentation

open access: yes, 2020
This my presentation on RDM presented during the workshop organised by ...
Kataria, Sanjay, Ahmed, Jamil
openaire   +1 more source

Understanding DRM [PDF]

open access: yesQueue, 2007
The explosive growth of the Internet and digital media has created both tremendous opportunities and new threats for content creators. Advances in digital technology offer new ways of marketing, disseminating, interacting with, and monetizing creative works, giving rise to expanding markets that did not exist just a few years ago.
openaire   +1 more source

Evaluation of the volumetric erosion of spherical electrical contacts using the defect removal method

open access: yes, 2006
Volumetric erosion is regarded as a significant index for studying the erosion process of electrical switching contacts. Three-dimensional (3-D) surface measurement techniques provide an approach to investigate the geometric characteristics and ...
Hill, M., McBride, J.W., Zhang, D.
core   +1 more source

The role of drug resistance in poor viral suppression in rural South Africa: findings from a population-based study. [PDF]

open access: yes, 2020
BACKGROUND:Understanding factors driving virological failure, including the contribution of HIV drug resistance mutations (DRM), is critical to ensuring HIV treatment remains effective.
Barnhart, Scott   +9 more
core  

Distortion risk measures for sums of dependent losses [PDF]

open access: yes, 2010
We discuss two distinct approaches, for distorting risk measures of sums of dependent random variables, which preserve the property of coherence. The first, based on distorted expectations, operates on the survival function of the sum.
Brahimi, Brahim   +2 more
core   +3 more sources

АНАЛІЗ ТИПІВ БЛОКЧЕЙНІВ ТА ЇХ ПРИДАТНОСТІ ДЛЯ СХОВИЩ ЗОБРАЖЕНЬ

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології
Досліджено різні типи блокчейнів та їх можливе використання для створення сховища зображень. Метою дослідження було оцінити переваги та обмеження різних типів блокчейнів з точки зору зберігання зображень.
Glib Tereshchenko, Yelyzaveta Pysarenko
doaj   +1 more source

Acid Sphingomyelinase Regulates the Localization and Trafficking of Palmitoylated Proteins [PDF]

open access: yes, 2019
In human, loss of Acid Sphingomeylinase (ASM/SMPD1) causes Niemann-Pick Disease, type A. ASM hydrolyzes sphingomyelins to produce ceramides but protein targets of ASM remain largely unclear. ...
Kim, Yongsoon   +7 more
core   +2 more sources

‘Not Too Good to be True’: A Proposal to Further Benefit from Emergence in Management Research

open access: yesM@n@gement, 2023
Emergence is inherent to organizational life and design. Throughout the 20th and 21st centuries, emergence has been appraised as a conceptual avenue that surpassed the limitations of traditional thinking and epistemology.
Anouck Adrot
doaj   +1 more source

A Numerical–Experimental Approach for Multi‐Matrix Fiber‐Reinforced Plastics Characterization Using Finite Element Model Updating

open access: yesAdvanced Engineering Materials, EarlyView.
A numerical–experimental framework is developed for characterizing multi‐matrix fiber‐reinforced polymers (MM‐FRPs) combining epoxy and polyurethane matrices. Harmonic bending tests are integrated with finite element model updating (FEMU) to simultaneously identify elastic and viscoelastic material parameters.
Rodrigo M. Dartora   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy