Results 291 to 300 of about 3,871,840 (378)
Development of a Hospital-at-Home Digital Twin for Patients With Frailty: Scoping Review.
Yahya F +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Network Design, Modelling and Performance Evaluation, 2018
In this chapter, the author will first present in Section 3.1 an overview of IP addresses with various types and addressing mechanisms. The first version of IP addresses, namely, IP version 4 (IPv4) will be discussed in Section 3.2 followed by various mechanisms for dividing the network with subnetting in Sections 3.3 and 3.4 as well as how to group ...
Quoc-Tuan Vien
openaire +2 more sources
In this chapter, the author will first present in Section 3.1 an overview of IP addresses with various types and addressing mechanisms. The first version of IP addresses, namely, IP version 4 (IPv4) will be discussed in Section 3.2 followed by various mechanisms for dividing the network with subnetting in Sections 3.3 and 3.4 as well as how to group ...
Quoc-Tuan Vien
openaire +2 more sources
Expert Syst. J. Knowl. Eng., 2022
Today, Internet of things (IoT), Cloud and Fog networks have spread out around the world. The more these networks grow, the more their energy consumption comes to attention.
Shadi Mahmoodi Khaniabadi +5 more
semanticscholar +1 more source
Today, Internet of things (IoT), Cloud and Fog networks have spread out around the world. The more these networks grow, the more their energy consumption comes to attention.
Shadi Mahmoodi Khaniabadi +5 more
semanticscholar +1 more source
RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones
IEEE Internet of Things Journal, 2022Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones deployed for collecting sensitive data to be used in critical applications. The drones transmit the collected data to the control room (CR) for analysis, while CR sends
Muhammad Tanveer +3 more
semanticscholar +1 more source
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
IEEE Internet of Things Journal, 2021One of the most important and critical requirements for the Internet of Vehicles (IoV) is security under strict latency. Typically, authentication protocols for vehicular ad hoc networks need to authenticate themselves frequently. This results in reduced
M. Aman, Uzair Javaid, B. Sikdar
semanticscholar +1 more source
SURFER: A Secure SDN-Based Routing Protocol for Internet of Vehicles
IEEE Internet of Things Journal, 2021Software-defined networking (SDN) is becoming the most dominant method for network management. By decoupling the control plane from the data plane, SDN provides a centralized view and more flexibility, scalability, and global knowledge of the network. In
Khaleel W. Mershad
semanticscholar +1 more source

