Results 41 to 50 of about 40,229 (207)
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot ...
Wei Ren, Linchen Yu, Liangli Ma, Yi Ren
doaj +1 more source
Within the evolvement of Industry 4.0, the need for flexible real-time communication technologies emerges. Time-Sensitive Networking enables deterministic communication in IEEE 802 networks.
Manish Kumar +4 more
doaj +1 more source
M2M Communication Technology Development Under the Background of LTE Evolution
M2M is one key technology for smart city. Both communication characteristics and business characteristics of M2M have raised new requirements for mobile networks.
Yi Wang
doaj +2 more sources
HILT IV : subject interoperability through building and embedding pilot terminology web services [PDF]
A report of work carried out within the JISC-funded HILT Phase IV project, the paper looks at the project's context against the background of other recent and ongoing terminologies work, describes its outcome and conclusions, including technical outcomes
Joseph, Anu +2 more
core +1 more source
In Situ Alloying of H13 Tool Steel With TiC via PBF‐LB/M
H13 tool steel is in situ alloyed with titanium carbides (TiC) in amounts up to 30 wt.%. This approach offers the advantage that the carbides melt only partially during processing, preventing excessive carbon enrichment of the steel matrix. The resulting microstructure consists of coarse, undissolved and fine, reprecipitated carbides, leading to grain ...
Oliver Bürgi +2 more
wiley +1 more source
Energy Efficient Uplink MAC Protocol for M2M Devices
To enable connectivity between a massive number of devices on the Internet of Things (IoT) paradigm, machine-to-machine (M2M) communication is implied. The key feature of emerging and ad hoc networks, such as M2M communication, is a low-complexity medium
Anum Ali +2 more
doaj +1 more source
Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their
Karam Eddine Bilami, Pascal LORENZ
doaj +1 more source
Made-to-measure galaxy models - II Elliptical and Lenticular Galaxies
We take a sample of 24 elliptical and lenticular galaxies previously analysed by the SAURON project using three-integral dynamical models created with Schwarzschild's method, and re-analyse them using the made-to-measure (M2M) method of dynamical ...
Binney +25 more
core +1 more source
Model‐Based Systems Engineering in Space Applications: A Comprehensive Literature Review
ABSTRACT The growing complexity of space engineering is driving the demand to embrace the adoption of Model‐Based Systems Engineering (MBSE). Although the MBSE is well‐practiced in the space industry, the level of effort and need required to obtain the benefits of MBSE vastly differ across enterprises; this disparity presents a significant challenge to
Rehobot Bekele Buruso +4 more
wiley +1 more source
Two-Point Functions and S-Parameter in QCD-like Theories
We calculated the vector, axial-vector, scalar and pseudo-scalar two-point functions up to two-loop level in the low-energy effective field theory for three different QCD-like theories. In addition we also calculated the pseudo-scalar decay constant $G_M$
AV Smilga +28 more
core +1 more source

