Results 61 to 70 of about 5,465,959 (370)

An Internet-Oriented Multilayer Network Model Characterization and Robustness Analysis Method

open access: yesEntropy, 2022
The Internet creates multidimensional and complex relationships in terms of the composition, application and mapping of social users. Most of the previous related research has focused on the single-layer topology of physical device networks but ignored ...
Yongheng Zhang   +4 more
doaj   +1 more source

Quality of Service over Specific Link Layers: state of the art report [PDF]

open access: yes, 1999
The Integrated Services concept is proposed as an enhancement to the current Internet architecture, to provide a better Quality of Service (QoS) than that provided by the traditional Best-Effort service.
Ait Yaiz, Rachid   +2 more
core   +2 more sources

Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview [PDF]

open access: yesEntropy, 2017
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques.
Junqing Zhang   +3 more
semanticscholar   +1 more source

Visual Recovery Reflects Cortical MeCP2 Sensitivity in Rett Syndrome

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Rett syndrome (RTT) is a devastating neurodevelopmental disorder with developmental regression affecting motor, sensory, and cognitive functions. Sensory disruptions contribute to the complex behavioral and cognitive difficulties and represent an important target for therapeutic interventions.
Alex Joseph Simon   +12 more
wiley   +1 more source

Design and implementation of the node identity internetworking architecture [PDF]

open access: yes, 2008
The Internet Protocol (IP) has been proven very flexible, being able to accommodate all kinds of link technologies and supporting a broad range of applications.
Abrahamsson, Henrik   +3 more
core  

A Spatially Resolved View on the Aging Substantia nigra: An Exploratory Proteomic Study

open access: yesAdvanced Biology, EarlyView.
Although aging is the most important risk factor for several neurodegenerative diseases, the molecular effects of physiological aging are still understudied. By applying spatially‐resolved proteomic analyses of the human substantia nigra pars compacta, alterations in vesicular trafficking and mitochondrial proteins are observed, as well as reduced ...
Britta Eggers   +10 more
wiley   +1 more source

Part Ⅲ of Lecture of Internet of Things and Sensor Mine -- Characteristics and Key Technologies of Sensor Mine Internet of Things

open access: yesGong-kuang zidonghua, 2010
The paper indicated that sensor mine Internet of things is extension and extended application based on integrated automation of coal mine, it is different from integrated automation system in a great degree; it is also different from application of ...
ZHANG Shen   +3 more
doaj  

Architecture design and demand analysis on application layer of standard system for ubiquitous power Internet of Things

open access: yesGlobal Energy Interconnection, 2021
The ubiquitous power Internet of Things (UPIoT) is an intelligent service system with comprehensive state perception, efficient processing, and flexible application of information.
Jing Zhang   +3 more
doaj   +1 more source

A middleware for creating physical mashups of things [PDF]

open access: yes, 2017
Indexación: Scopus.Nowadays, “things” deployed in cities are crucial to gather data to support decision making systems. Unfortunately, there is a low level of reuse of “things” between smart city applications of different organizations because “things ...
Herrera, H., Torres, R.
core  

Perception layer security in the internet of things

open access: yesProcedia Computer Science, 2020
Abstract The Internet of Things (IoT) paradigm is one of the most exciting innovations of recent years. However, with each connected object the number of possible attacks will increase exponentially. This article presents a comparative study between the different solutions against Iot attacks, we will first present a security architecture that can be
K. Aarika   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy