Results 91 to 100 of about 324,498 (376)

Multifunctional Fibrous Mats: Stretchable, Conductive, and Hydrophilic Platforms for Wearable Electronics

open access: yesAdvanced Materials Technologies, EarlyView.
A hydrophilic, stretchable, nonwoven electrospun fiber mat targeted to be applied in long‐term bioelectronic devices. By incorporating amphiphilic polyethylene glycol block copolymers in a polydimethylsiloxane matrix, the material develops stable hydrophilicity, enhanced breathability, as well as enhanced adhesion to cells.
Joab S. Dorsainvil   +7 more
wiley   +1 more source

Hybrid optimal cluster routing protocol for mobile ad hoc network

open access: yesTongxin xuebao, 2010
Based on the analysis of the cluster stability and maintaining overhead of cluster routing protocols in mobile ad hoc networks,a optimized clustering strategy was designed and a corresponding optimal cluster based hybrid routing protocol was proposed ...
NIU Xiao-guang1   +2 more
doaj   +2 more sources

Database Exchanges for Ad-hoc Networks Using Proactive Link State Protocols [PDF]

open access: yes, 2009
International audienceThe OSPF routing protocol is currently the predominant IGP in use on the fixed Internet of today. This routing protocol scales ''world wide", under the assumptions of links being relatively stable, network density being rather low ...
Baccelli, Emmanuel   +2 more
core   +1 more source

Cellulose‐Based Electrolytes in Rechargeable Zn‐Battery: An Overview

open access: yesAdvanced Sustainable Systems, EarlyView.
Zn‐ion battery with cellulose‐based electrolyte and diffused cathode such as MnO2 and V2O5 can be actually proposed as a rechargeable system for energy storage from renewable sources such as solar and wind, due to its relevant cycle life and the remarkably competitive low cost.
Jusef Hassoun   +2 more
wiley   +1 more source

Protection of an intrusion detection engine with watermarking in ad hoc networks [PDF]

open access: yes, 2010
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware.
Douligeris, C.   +2 more
core  

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

open access: yes, 2014
Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-
Bild, David R.   +4 more
core   +1 more source

Bilirubin Targeting WNK1 to Alleviate NLRP3‐Mediated Neuroinflammation

open access: yesAdvanced Science, EarlyView.
At physiological concentrations, bilirubin binds to the kinase domain of WNK1, thereby augmenting its activity and facilitating the phosphorylation of downstream SPAK/OSR1. This phosphorylation inhibits KCC2 activity, leading to elevate intracellular chloride levels in neurons.
Linfei Mao   +14 more
wiley   +1 more source

Research on the subtractive clustering algorithm for mobile ad hoc network based on the Akaike information criterion

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Large and dense mobile ad hoc networks often meet scalability problems, the hierarchical structures are needed to achieve performance of network such as cluster control structure.
Liu Banteng   +3 more
doaj   +1 more source

A two‐step authentication framework for Mobile ad hoc networks [PDF]

open access: yes, 2007
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C.   +2 more
core  

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy