Results 51 to 60 of about 20,148 (223)

Secure and Reliable Data Transmission Over MANET Based On Principles of Computationally Secure Secret Sharing

open access: yesТруды Института системного программирования РАН, 2019
Mobile Ad-Hoc Networks (MANET) require special approaches to the design and selection of data transmission and security algorithms Nodes mobility and dynamic topology give rise to two key problems of MANET – the difficulty of ensuring confidentiality ...
Nikolay Ivanovitch Chervyakov   +6 more
doaj   +1 more source

The Bourdieusian Unconscious: The Scientific and Political Significance of the Sociological Treatment of a Psychoanalytic Concept

open access: yesJournal for the Theory of Social Behaviour, Volume 55, Issue 1, March 2025.
ABSTRACT From the very beginning of Pierre Bourdieu's oeuvre, but with increasing intensity, one can find expressions that are either explicitly taken from psychoanalysis, or at least have a psychoanalytic meaning. This paper aims to contribute to the existing discourse on Bourdieu's relation to psychoanalysis by examining the meaning of Bourdieu's ...
Gergely Csányi
wiley   +1 more source

Exponential Genetic Algorithm-Based Stable and Load-Aware QoS Routing Protocol for MANET

open access: yesJournal of Intelligent Systems, 2017
As the actual links in mobile ad hoc networks (MANETs) are dynamic, the feasible path generated may not exist during the transmission of multimedia data. There is a need for generating multiple paths for guaranteed transmission.
Rama Rao A.   +2 more
doaj   +1 more source

The Impact of IEEE 802.11 Contention Window on The Performance of Transmission Control Protocol in Mobile Ad-Hoc Network

open access: yesAdvances in Distributed Computing and Artificial Intelligence Journal, 2020
A Mobile Ad-hoc Network (MANET) is a group of nodes connected via ad-hoc fashion for communicating with each other through wireless interface. The communication among the nodes in such network take place by using multi-hop in the absence of fixed ...
Iqtidar Ali   +4 more
doaj   +1 more source

Protein kinase R induced by type I interferons is a main regulator of reactive microglia in Zika virus infection

open access: yesGlia, Volume 73, Issue 1, Page 80-104, January 2025.
Main Points Type I interferons (IFNs‐I) from ZIKV‐infected neurons shape the reactivity of non‐infected microglia PKR activates microglia's phagocytic, pro‐inflammatory and morphological response inducing STAT1 phosphorylation and IRF1 expression Abstract Microglial cells are the phagocytic cells of the brain that under physiological conditions ...
Violaine Bortolin   +14 more
wiley   +1 more source

METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
The analysis of existing methods of mobile radio networks intrusion detection was performed in the article and classification of intrusion detection methods was produced.
Serhii V. Salnyk   +2 more
doaj  

Discovery Routing Time Speed Comparison of AODV, OLSR and ZRP protocols on MANET

open access: yesInternational Journal of Electrical, Energy and Power System Engineering, 2020
Mobile Ad hoc Network (MANET) is a wireless network that contains a collection of nodes without infrastructure and interconnected to communicate. MANET works dynamically when a group of nodes moves spontaneously, so the network topology can change ...
Ery Safrianti   +2 more
doaj   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

SR‐SAAD: A Social Rank‐Based Routing Protocol for Enhanced Efficiency in Delay Tolerant Networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Traditional networks struggle with message delivery when no end‐to‐end path exists, a challenge addressed by DTNs) using social metrics in routing. The proposed SR‐SAAD protocol leverages degree centrality, social activeness, and RWE to compute a SR for selecting optimal relay nodes.
Saif Ullah   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy