Results 41 to 50 of about 40,229 (207)

How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot ...
Wei Ren, Linchen Yu, Liangli Ma, Yi Ren
doaj   +1 more source

Evaluation of the Time-Aware Priority Queueing Discipline with Regard to Time-Sensitive Networking in Particular IEEE 802.1Qbv

open access: yesProceedings of the International Conference on Applied Innovations in IT, 2019
Within the evolvement of Industry 4.0, the need for flexible real-time communication technologies emerges. Time-Sensitive Networking enables deterministic communication in IEEE 802 networks.
Manish Kumar   +4 more
doaj   +1 more source

M2M Communication Technology Development Under the Background of LTE Evolution

open access: yesDianxin kexue, 2014
M2M is one key technology for smart city. Both communication characteristics and business characteristics of M2M have raised new requirements for mobile networks.
Yi Wang
doaj   +2 more sources

HILT IV : subject interoperability through building and embedding pilot terminology web services [PDF]

open access: yes, 2009
A report of work carried out within the JISC-funded HILT Phase IV project, the paper looks at the project's context against the background of other recent and ongoing terminologies work, describes its outcome and conclusions, including technical outcomes
Joseph, Anu   +2 more
core   +1 more source

In Situ Alloying of H13 Tool Steel With TiC via PBF‐LB/M

open access: yessteel research international, EarlyView.
H13 tool steel is in situ alloyed with titanium carbides (TiC) in amounts up to 30 wt.%. This approach offers the advantage that the carbides melt only partially during processing, preventing excessive carbon enrichment of the steel matrix. The resulting microstructure consists of coarse, undissolved and fine, reprecipitated carbides, leading to grain ...
Oliver Bürgi   +2 more
wiley   +1 more source

Energy Efficient Uplink MAC Protocol for M2M Devices

open access: yesIEEE Access, 2019
To enable connectivity between a massive number of devices on the Internet of Things (IoT) paradigm, machine-to-machine (M2M) communication is implied. The key feature of emerging and ad hoc networks, such as M2M communication, is a low-complexity medium
Anum Ali   +2 more
doaj   +1 more source

Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks

open access: yesFuture Internet, 2022
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their
Karam Eddine Bilami, Pascal LORENZ
doaj   +1 more source

Made-to-measure galaxy models - II Elliptical and Lenticular Galaxies

open access: yes, 2012
We take a sample of 24 elliptical and lenticular galaxies previously analysed by the SAURON project using three-integral dynamical models created with Schwarzschild's method, and re-analyse them using the made-to-measure (M2M) method of dynamical ...
Binney   +25 more
core   +1 more source

Model‐Based Systems Engineering in Space Applications: A Comprehensive Literature Review

open access: yesSystems Engineering, EarlyView.
ABSTRACT The growing complexity of space engineering is driving the demand to embrace the adoption of Model‐Based Systems Engineering (MBSE). Although the MBSE is well‐practiced in the space industry, the level of effort and need required to obtain the benefits of MBSE vastly differ across enterprises; this disparity presents a significant challenge to
Rehobot Bekele Buruso   +4 more
wiley   +1 more source

Two-Point Functions and S-Parameter in QCD-like Theories

open access: yes, 2011
We calculated the vector, axial-vector, scalar and pseudo-scalar two-point functions up to two-loop level in the low-energy effective field theory for three different QCD-like theories. In addition we also calculated the pseudo-scalar decay constant $G_M$
AV Smilga   +28 more
core   +1 more source

Home - About - Disclaimer - Privacy