Results 41 to 50 of about 39,862 (188)

External Evaluation and Cost-Benefit Analysis of mothers2mothers' Mentor Mother Programme in Uganda [PDF]

open access: yes, 2015
This external evaluation examines whether the core component of m2m's Mentor Mother Model -- peer education an psychosocial support services -- improves the uptake of Prevention of Mother-To-Child Transmission (PMTCT) services, as wel as the health and ...

core  

M2M meets D2D: Harnessing D2D interfaces for the aggregation of M2M data [PDF]

open access: yes2017 IEEE International Conference on Communications (ICC), 2017
Direct device-to-device (D2D) communication presents as an effective technique to reduce the load at the base station (BS) while ensuring reliable localized communication. In this paper, we propose a large-scale M2M data Aggregation and Trunking (MAT) scheme, whereby the user equipments (UEs) aggregate M2M data from the nearby MTDs and trunk this data ...
Asma Afzal   +4 more
openaire   +1 more source

Navigating uncertainty in a nascent ecosystem: How shifting cognitive frames influence an incumbent firm's platform scope strategies

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary We examine how an incumbent firm navigates internal and external uncertainties when entering a nascent platform ecosystem. Drawing on a longitudinal study of a large telecommunication firm's transition into an evolving IoT ecosystem, we advance a cognitive perspective on platform strategy.
Fathiro H. R. Putra   +3 more
wiley   +1 more source

M2M Communication Technology Development Under the Background of LTE Evolution

open access: yesDianxin kexue, 2014
M2M is one key technology for smart city. Both communication characteristics and business characteristics of M2M have raised new requirements for mobile networks.
Yi Wang
doaj   +2 more sources

How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot ...
Wei Ren, Linchen Yu, Liangli Ma, Yi Ren
doaj   +1 more source

Evaluation of the Time-Aware Priority Queueing Discipline with Regard to Time-Sensitive Networking in Particular IEEE 802.1Qbv

open access: yesProceedings of the International Conference on Applied Innovations in IT, 2019
Within the evolvement of Industry 4.0, the need for flexible real-time communication technologies emerges. Time-Sensitive Networking enables deterministic communication in IEEE 802 networks.
Manish Kumar   +4 more
doaj   +1 more source

A Reproducible Workflow for Macrophage Membrane Isolation and Nanocore Selection Toward Bioinspired Nanoparticles Targeting Immunologically Cold Tumors

open access: yesSmall Methods, EarlyView.
A reproducible workflow is established for isolating macrophage membranes to enable the efficient preparation and characterization of membrane‐coated nanoparticles. By optimizing M2‐like nanovesicle stability and nanocore compatibility, this procedure advances the engineering of macrophage membrane‐coated nanoparticles with improved tumor targeting ...
Diana Peixoto   +6 more
wiley   +1 more source

Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks

open access: yesFuture Internet, 2022
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their
Karam Eddine Bilami, Pascal LORENZ
doaj   +1 more source

Shear Viscosities from Kubo Formalism in a large-$N_{\rm c}$ Nambu--Jona-Lasinio Model

open access: yes, 2015
In this work the shear viscosity of strongly interacting matter is calculated within a two-flavor Nambu--Jona-Lasinio model as a function of temperature and chemical potential.
Kaiser, Norbert   +2 more
core   +1 more source

Generation cycles in experimental populations of a multivoltine insect

open access: yesJournal of Animal Ecology, EarlyView.
Although theory suggests various mechanisms by which environmental and ecological factors may drive generational fluctuations, our field‐cage experiment is the first to demonstrate how internal dynamics and external disturbances jointly produce synchronised, large‐scale outbreak cycles.
Takehiko Yamanaka   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy