Results 71 to 80 of about 3,871,840 (378)
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as
Seung-Man Chun, Jong-Tae Park
doaj +1 more source
Visual Recovery Reflects Cortical MeCP2 Sensitivity in Rett Syndrome
ABSTRACT Objective Rett syndrome (RTT) is a devastating neurodevelopmental disorder with developmental regression affecting motor, sensory, and cognitive functions. Sensory disruptions contribute to the complex behavioral and cognitive difficulties and represent an important target for therapeutic interventions.
Alex Joseph Simon +12 more
wiley +1 more source
Efficient Transport Protocol for Networked Haptics Applications [PDF]
The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications.
Barrio Gragera, Jorge +5 more
core +1 more source
Architecture and practice of BGP internet routing visibility and security detection
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol of today’s global internet for exchanging routing information.However, it was supposed that all participants were reliable without generating routing security issues by mistakes ...
Chaoyang YE +4 more
doaj +2 more sources
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin +12 more
wiley +1 more source
Limits To Certainty in QoS Pricing and Bandwidth [PDF]
Advanced services require more reliable bandwidth than currently provided by the Internet Protocol, even with the reliability enhancements provided by TCP.
Camp, L Jean, Gideon, Carolyn
core +1 more source
Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things [PDF]
Chien‐Ming Chen +4 more
openalex +1 more source
Prediction Model for Etiologic Differentiation of Isolated Vestibular Syndrome in Emergency Settings
ABSTRACT Objective This study aimed to develop and validate a predictive model for differentiating central from peripheral etiologies in patients with isolated vestibular syndrome (VS). Methods In this multicenter retrospective cohort study, 506 patients with isolated VS from five hospitals were divided into derivation (n = 301) and validation (n = 205)
Guo Wenting +12 more
wiley +1 more source
Mobile IP: state of the art report [PDF]
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node.
Heijenk, Geert, Karagiannis, Georgios
core +2 more sources
Secret sharing-based authentication and key agreement protocol for machine-type communications
One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of ...
Ana Paula G Lopes +3 more
doaj +1 more source

