Results 21 to 30 of about 124,607 (59)

Enhanced P2P Services Providing Multimedia Content

open access: yesAdvances in Multimedia, 2007
The retrieval facilities of most Peer-to-Peer (P2P) systems are limited to queries based on unique identifiers or small sets of keywords. Unfortunately, this approach is very inadequate and inefficient when a huge amount of multimedia resources is shared.
E. Ardizzone   +4 more
doaj   +1 more source

Mobile Cloud Computing: Taxonomy and Challenges

open access: yesJournal of Computer Networks and Communications, 2020
Mobile cloud computing (MCC) holds a new dawn of computing, where the cloud users are attracted to multiple services through the Internet. MCC has a qualitative, flexible, and cost-effective delivery platform for providing services to mobile cloud users ...
Ahmed Aliyu   +6 more
doaj   +1 more source

Impact of the Air-Conditioning System on the Power Consumption of an Electric Vehicle Powered by Lithium-Ion Battery

open access: yesModelling and Simulation in Engineering, 2013
The car occupies the daily universe of our society; however, noise pollution, global warming gas emissions, and increased fuel consumption are constantly increasing.
Brahim Mebarki   +4 more
doaj   +1 more source

Impact of Business Interoperability on the Performance of Complex Cooperative Supply Chain Networks: A Case Study

open access: yesComplexity, 2018
This paper proposes an agent-based model for evaluating the effect of business interoperability on the performance of cooperative supply chain networks. The model is based on insights from the Industrial Marketing and Purchasing network approach and the ...
Izunildo Cabral, Antonio Grilo
doaj   +1 more source

Fish Detection Using Deep Learning

open access: yesApplied Computational Intelligence and Soft Computing, 2020
Recently, human being’s curiosity has been expanded from the land to the sky and the sea. Besides sending people to explore the ocean and outer space, robots are designed for some tasks dangerous for living creatures.
Suxia Cui   +3 more
doaj   +1 more source

Propagation Analysis for Automated Switching of Embedded RFID with GPS in Wireless Sensor Network Platform

open access: yesInternational Journal of Distributed Sensor Networks, 2015
A 2.45 GHz active integrated ZigBee RFID system embedded with GPS is developed with an automated switching protocol algorithm utilizing wireless sensor network (WSN) platform to track the physical belongings or people in indoor and outdoor environments ...
F. A. Poad, W. Ismail
doaj   +1 more source

A Theoretic Approach for Prolonging Lifetime of Wireless Sensor Networks Based on the Coalition Game Model

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Energy consumption is one of the most important performance measures in wireless sensor networks (WSNs). In order to reduce energy consumption, some nodes in the network will work together as a coalition but will not work independently.
Kun Yue   +4 more
doaj   +1 more source

Adaptive Fast Nonsingular Fixed-Time Tracking Control for Robot Manipulators

open access: yesComplexity, 2021
This paper studies the fixed-time trajectory tracking control problem of robot manipulators in the presence of uncertain dynamics and external disturbances.
Huihui Pan, Guangming Zhang
doaj   +1 more source

Parameter Optimization of a Temperature and Relative Humidity Based Transmission Power Control Scheme for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
We present refinements of a novel transmission power control (TPC) algorithm based on temperature and relative humidity (TRH). Previously, we deployed a prototype TRH TPC algorithm on wireless sensor nodes operating in real harsh environmental conditions
César Ortega-Corral   +5 more
doaj   +1 more source

How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot ...
Wei Ren, Linchen Yu, Liangli Ma, Yi Ren
doaj   +1 more source

Home - About - Disclaimer - Privacy