Results 51 to 60 of about 401 (175)

A Thorough Review of Security in Information‐Centric Networking

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The rapid evolution of technology has revealed the limitations of host‐centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information‐centric networking (ICN), which focuses on content (data) regardless of its location in the network.
Ado Adamou Abba Ari   +7 more
wiley   +1 more source

Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments [PDF]

open access: yes2019 International Conference on Military Communications and Information Systems (ICMCIS), 2019
Mobile military networks are uniquely challenging to build and maintain, because of their wireless nature and the unfriendliness of the environment, resulting in unreliable and capacity limited performance. Currently, most tactical networks implement TCP/IP, which was designed for fairly stable, infrastructure-based environments, and requires ...
Campioni L.   +4 more
openaire   +2 more sources

The constraints of sedimentary environment on the evolution of bauxite reservoir characteristics within the benxi formation in the Linxing area, Ordos Basin, China

open access: yesEnergy Science &Engineering, Volume 12, Issue 12, Page 5520-5541, December 2024.
Sedimentary environment geochemical indicators and physical property comparison profiles of different lithofacies bauxite rocks. Abstract The breakthrough of bauxite natural gas in the Taiyuan Formation in the Longdong area of the Ordos Basin makes bauxite natural gas gradually become a new exploration direction.
Yin Yuan   +3 more
wiley   +1 more source

A Novel Local‐Inertial Formulation Representing Subgrid Scale Topographic Effects for Urban Flood Simulation

open access: yesWater Resources Research, Volume 60, Issue 5, May 2024.
Abstract The local‐inertial approximations of the shallow water equations (SWEs) have been used for flood forecasting at larger spatial scales owing to the improved computational efficiency and similar accuracy compared to the full 2D SWEs. With the availability of high‐resolution elevation data, the complex terrain of urban areas with various small ...
N. Nithila Devi, Soumendra Nath Kuiry
wiley   +1 more source

Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data Networking

open access: yesIEEE Access, 2018
Named data networking (NDN) has emerged as a future networking architecture having the potential to replace the Internet. In order to do so, the NDN needs to cope with inherent problems of the Internet, such as attacks that cause information leakage from
Daishi Kondo   +4 more
doaj   +1 more source

Formal support and service needs of family caregivers of adults with intellectual and/or developmental disabilities in India

open access: yesJournal of Applied Research in Intellectual Disabilities, Volume 37, Issue 3, May 2024.
Abstract Background Despite the enactment of disability laws/policies in India, research shows that caregivers of adults with intellectual and/or developmental disabilities experience inadequate formal supports/services due to dissemination barriers and lack of awareness about them.
Sumithra Murthy   +2 more
wiley   +1 more source

NDN caching strategy based on node median and edge popularity [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the redundancy and inefficiency of most caching strategy in Named Data Networking(NDN) architecture,a caching placement strategy BEP based on node median and edge content popularity is proposed.Combining the median centrality of node with the ...
CHEN Jiebo,ZHENG Quan,WANG Song
doaj   +1 more source

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li   +3 more
wiley   +1 more source

Design and Implementation of DHT Algorithm for NDN

open access: yesDianxin kexue, 2014
A novel distributed Hash table(DHT)algorithm under named data networking(NDN), which was called ndnDHT, was proposed. The algorithm brings the DHT to NDN for the first time. A new binary method using the structure of NDN was designed.
Kai Lei, Meng Yuan
doaj   +2 more sources

Enhancing Global Optimization through the Integration of Multiverse Optimizer with Opposition‐Based Learning

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2024, Issue 1, 2024.
The multiverse optimizer (MVO) is increasingly recognized across various scientific disciplines for its robust search capabilities that enhance decision‐making in diverse tasks. Despite its strengths, MVO often encounters limitations due to premature convergence, reducing its overall efficiency.
Vu Hong Son Pham   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy