Results 81 to 90 of about 3,948 (214)
An analysis of the three major protocols of AODV, DSDV, and OLSR in the VANET environment based on the proposed ECIE method is the major focus of this work. The work performed authentication and encrypting of vehicles and route data before forwarding it. Furthermore, optimal neighbours were selected, and trustworthiness verified.
Moawiah El‐Dalahmeh +2 more
wiley +1 more source
Optimizing Surface Voxelization for Triangular Meshes with Equidistant Scanlines and Gap Detection
This paper presents an efficient, single‐pass, parallel algorithm for voxelizing triangular mesh surfaces using equidistant scanlines and gap detection. The proposed method performs particularly well in densely populated scenes with homogeneous triangle sizes, and at higher resolutions while being highly portable and easily adaptable.
S. Delgado Díez +2 more
wiley +1 more source
Oracle Based Active Set Algorithm for Scalable Elastic Net Subspace Clustering
State-of-the-art subspace clustering methods are based on expressing each data point as a linear combination of other data points while regularizing the matrix of coefficients with $\ell_1$, $\ell_2$ or nuclear norms.
Li, Chun-Guang +3 more
core +1 more source
Exploring the depths of on‐water training in highly‐trained rowing athletes
Abstract This investigation examined the association between on‐water rowing stroke‐rate (SR), velocity and heart‐rate (HR) in highly trained rowers (n = 8 male; n = 8 female and 19.3 ± 1.1 year) over a 4‐month real‐world (i.e., variable environment and boat class) training period. On‐water SR, prognostic velocity (percent of world's best velocity) and
Sophie P. Watts +4 more
wiley +1 more source
Drop-Burst Length Evaluation of Urban VANETs
Networks performance is traditionally evaluated using packet delivery ratio (PDR) and latency (delay). We propose an addition mechanism the drop-burst length (DBL).
Awos Kh. Ali +2 more
doaj +1 more source
Abstract The aim of this study was to determine test‐retest reliability and concurrent validity of vertical force‐velocity‐power (FVP) profiles using Smith machine and free‐weight countermovement jumps (CMJs). A repeated‐measure cross‐over design with randomized load order and counterbalanced trials was employed.
Andrew M. Jonson +6 more
wiley +1 more source
The scattering diameters of Sgr A* and several nearby OH masers (~ 1" at 1 GHz) indicate that a region of enhanced scattering is along the line of sight to the Galactic center.
Anantharamaiah K. R. +17 more
core +2 more sources
Cross‐Layer Greedy‐Based Routing in VANETs: Virtual Multibackbones Approach
An efficient data packet delivery in a vehicular ad hoc network (VANET) is still a challenging task because of the rapid changes in the network topology and the instability of link quality, especially for nonsafety applications. Several routing schemes are proposed to improve the reliability of data delivery between vehicles.
Mohamed Nabil +4 more
wiley +1 more source
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar +2 more
core +2 more sources
We consider Robot-assisted Search $\&$ Rescue operations enhanced with some fixed image sensor nodes capable of capturing and sending visual information to a robot sink.
Diop, Mamour +2 more
core +1 more source

