Results 101 to 110 of about 3,871,840 (378)

Data‐Driven Distributed Safe Control Design for Multi‐Agent Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper presents a data‐driven control barrier function (CBF) technique for ensuring safe control of multi‐agent systems (MASs) with uncertain linear dynamics. A data‐driven quadratic programming (QP) optimization is first developed for CBF‐based safe control of single‐agent systems using a nonlinear controller. This approach is then extended to the
Marjan Khaledi, Bahare Kiumarsi
wiley   +1 more source

Securing Internet Protocol (IP) Storage: A Case Study

open access: yes, 2010
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S   +1 more
core   +1 more source

Robot‐Assisted Automated Serial‐Sectioning and Imaging for 3D Microstructural Investigations

open access: yesAdvanced Engineering Materials, EarlyView.
A fully automated 3D microstructure characterization platform provides new insights into materials. This robot‐assisted system performs serial‐sectioning, etching, and optical imaging to generate large‐volume 3D reconstructions with submicron resolution.
Michael Moschetti   +7 more
wiley   +1 more source

Multicast Internet protocol

open access: yesComputer Communications, 2000
In this paper, we first review the existing IPv4 based multicast protocols and identify their shortcomings. We then proposed a new multicast protocol, called Multicast Internet Protocol (MIP), which is both scalable and flexible. The design principle of MIP is fundamentally different from the existing IPv4 based multicast protocols.
WANG, X. K., DENG, Robert H., BAO, Feng
openaire   +3 more sources

A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts

open access: yesWireless Communications and Mobile Computing, 2018
In this paper, we propose a novel blockchain-based contractual routing (BCR) protocol for a network of untrusted IoT devices. In contrast to conventional secure routing protocols in which a central authority (CA) is required to facilitate the ...
Gholamreza Ramezan, Cyril Leung
semanticscholar   +1 more source

Advancing Electronic Application of Coordination Solids: Enhancing Electron Transport and Device Integration via Surface‐Mounted MOFs (SURMOFs)

open access: yesAdvanced Functional Materials, EarlyView.
The layer‐by‐layer (LbL) assembly of coordination solids, enabled by the surface‐mounted metal‐organic framework (SURMOF) platform, is on the cusp of generating the organic counterpart of the epitaxy of inorganics. The programmable and sequential SURMOF protocol, optimized by machine learning (ML), is suited for accessing high‐quality thin films of ...
Zhengtao Xu   +2 more
wiley   +1 more source

Membangun Server Voip Dengan Asterisk Di Linux Beserta Administrasi User Berbasis Website [PDF]

open access: yes, 2010
The development of computer network allows for rapid pass voice traffic over computer networks or common called VoIP (Voice Over Internet Protocol). Voice over Internet Protocol (VoIP) is a technology capable of passing voice traffic and video or even a ...
Setyowibowo, S. (Sigit)   +1 more
core  

Intramolecular Down‐ and Up‐Conversion in Dimeric Tetracene Complexes Centered via Platinum(II) and Palladium(II)

open access: yesAdvanced Functional Materials, EarlyView.
Metal‐tetracene dimeric complexes are synthesized through the pyridyl coordination to either Pt(II) or Pd(II). Photophysical properties are systematically compared as a function of the metal using steady‐state and time‐resolved spectroscopy. The Pt(II) dimer exhibits efficient intramolecular singlet fission and subsequent intramolecular up‐conversion ...
Yifan Bo   +4 more
wiley   +1 more source

Thermal and energy aware routing in wireless body area networks

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Unlike many other Internet of Things applications, in addition to the limited power of Internet of Medical Things devices, the safety aspect and reliability are the major concerns while designing wireless body area network routing solutions. In fact, the
Ghufran Ahmed   +2 more
doaj   +1 more source

A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things

open access: yesJOIV: International Journal on Informatics Visualization, 2017
Internet Engineering Task Force (IETF) have developed Constrained Application Protocol (CoAP) to enable communication between sensor or actuator nodes in constrained environments, such as small amount of memory, and low power. IETF CoAP and HTTP are used
Wenquan Jin, DoHyeun Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy