Results 1 to 10 of about 73,267 (212)

Optimal Caching and Routing in Hybrid Networks [PDF]

open access: yesarXiv, 2014
Hybrid networks consisting of MANET nodes and cellular infrastructure have been recently proposed to improve the performance of military networks. Prior work has demonstrated the benefits of in-network content caching in a wired, Internet context.
Dehghan, Mostafa   +5 more
arxiv   +3 more sources

Risk of SARS-CoV-2 Infection Among Essential Workers in a Community-Based Cohort in the United States

open access: yesFrontiers in Public Health, 2022
ObjectivesThe objective of this paper is to identify the risk factors for SARS-CoV-2 infection that are related to occupation type as well as workplace conditions.
Chih-Fu Wei   +13 more
doaj   +1 more source

Network Routing Issues in Global Geographic Information System [PDF]

open access: yesSHS Web of Conferences, 2021
Research background: A geographic information system (GIS) is a computer-based information system that gathers, manages, and disseminates different geographic (related to earth) information to provide intelligent analytics necessary for prompt decisions ...
Alameri Ibrahim Ahmed, Komarkova Jitka
doaj   +1 more source

Éditions Verdier : un lieu, un projet, un trajet collectif

open access: yesRelief: Revue Électronique de Littérature Francaise, 2021
Verdier est une maison d’édition indépendante avec un siège social à Lagrasse, dans l’Aude, et une permanence à Paris. La maison est aujourd’hui co-gérée par Colette Olive et Michèle Planel.
Manet van Montfrans
doaj   +1 more source

Fuzzy Extended Krill Herd Optimization with Quantum Bat Algorithm for Cluster Based Routing in Mobile Adhoc Networks

open access: yesJournal of Applied Science and Engineering, 2022
MANET integrates a set of autonomous mobile nodes which move independently and send data through wireless links. Clustering and routing are the commonly employed energy-efficient techniques, which can be treated as an NP hard problem and is resolved by ...
Maganti Srinivas, Dr.M.Ramesh Patnaik
doaj   +1 more source

Nicolaas van der Toorn, Le Jeu de l’ambiguïté et du mot. Ambiguïté intentionnelle et Jeu de mots chez Apollinaire, Prévert, Tournier et Beckett

open access: yesRelief: Revue Électronique de Littérature Francaise, 2020
Compte rendu de Nicolaas van der Toorn, Le Jeu de l’ambiguïté et du mot. Ambiguïté intentionnelle et Jeu de mots chez Apollinaire, Prévert, Tournier et Beckett, Leiden/Boston, Brill/Rodopi, coll. « Faux titre », 2020, 198 p.
Manet van Montfrans
doaj   +1 more source

A critical review of MANET testbed using mobile robot technology [PDF]

open access: yes, 2018
This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in
Abd Wahab, Mohd Helmy   +5 more
core   +3 more sources

Protokoły trasowania w sieciach AD HOC [PDF]

open access: yesZeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki, 2012
W artykule dokonano charakterystyki protokołów trasowania stosowanych w bezprzewodowych sieciach Ad Hoc, a także zilustrowano na drodze symulacji komputerowej zachowanie wybranych protokołów trasowania.
Arkadiusz Smolarek, Tomasz Malinowski
doaj   +1 more source

A SERVICE PACKAGE IDENTIFIER BASED SECURITY VERIFICATION ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORK

open access: yesICTACT Journal on Communication Technology, 2022
In general, the biggest problem with a mobile ad-hoc network is the threat to its security. This is because the mobile ad-hoc network is dismantled after a certain period of time, which spends a lot of time calculating its stability and greatly wastes ...
R Sabitha, G Kiruthiga
doaj   +1 more source

A lightweight technique for detection and prevention of wormhole attack in MANET [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managingmobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks.
Zulfiqar Zardari   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy