Results 1 to 10 of about 867,213 (272)

Threat assessment of aerial targets based on improved GRA-TOPSIS method and three-way decisions

open access: yesMathematical Biosciences and Engineering, 2023
Target threat assessment is a critical aspect of information warfare and can offer valuable auxiliary support to combat command decision-making. Aiming to address the shortcomings of three decision-making methods in air combat target assessment, such as ...
Yongfeng Yin, Routing Zhang , Qingran Su
doaj   +1 more source

The role of gut archaea in the pig gut microbiome: a mini-review

open access: yesFrontiers in Microbiology, 2023
The gastrointestinal microbiota of swine harbors an essential but often overlooked component: the gut archaea. These enigmatic microorganisms play pivotal roles in swine growth, health, and yield quality.
Jianbo Yang   +12 more
doaj   +1 more source

Revisión de requisitos, protocolos y desafíos en LWSN

open access: yesMaskay, 2021
Las redes inalámbricas de sensores son aplicables en diferentes topologías, un caso especial es la topología lineal, la cual está presente en el monitoreo de infraestructuras lineales a gran escala.
Carlos Egas, Felipe Gil-Castiñeira
doaj   +1 more source

A Comprehensive Survey on Vehicular Networking: Communications, Applications, Challenges, and Upcoming Research Directions

open access: yesIEEE Access, 2022
Nowadays, advanced communication technologies are being utilized to develop intelligent transportation management and driving assistance. Through the ability to exchange traffic and infotainment information between road infrastructure and vehicles ...
Nehad Hameed Hussein   +4 more
doaj   +1 more source

Multi-Agent Reinforcement Learning Framework in SDN-IoT for Transient Load Detection and Prevention

open access: yesTechnologies, 2021
The fast emergence of IoT devices and its accompanying big and complex data has necessitated a shift from the traditional networking architecture to software-defined networks (SDNs) in recent times. Routing optimization and DDoS protection in the network
Delali Kwasi Dake   +3 more
doaj   +1 more source

Routing with Renewable Energy Management in Wireless Sensor Networks

open access: yesSensors, 2021
In wireless sensor networks (WSNs), power consumption is an important aspect when designing routing protocols. When compared to other components of a sensor node, the power required by radio transmitters is responsible for most of the consumption.
João Junior   +4 more
doaj   +1 more source

Automatic Network Slicing for Admission Control, Routing, and Resource Allocation in Underwater Acoustic Communication Systems

open access: yesIEEE Access, 2022
Large-scale underwater wireless communications networks are gaining popularity because they are a critical enabler for a variety of applications in the environmental, commercial, and civilian domains.
Osama M. Bushnaq   +4 more
doaj   +1 more source

DDSLA-RPL: Dynamic Decision System Based on Learning Automata in the RPL Protocol for Achieving QoS

open access: yesIEEE Access, 2021
The internet of things is a worldwide technological development in communications. Low Power and Lossy Networks (LLN) are a fundamental part of the internet of things with numerous monitoring and controlling applications. This network has many challenges
Mohammad Hossein Homaei   +3 more
doaj   +1 more source

Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols [PDF]

open access: yes, 2010
In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State ...
Bibi, Ayesha   +3 more
core   +1 more source

Energy Aware IoT Routing Algorithms in Smart City Environment

open access: yesIEEE Access, 2022
Energy efficiency is one of the key aspects of IoT and Wireless Sensor Networks (WSNs) since the nodes of the network are running on battery power and the lifespan of the system is an important mission-critical parameter.
Peter Ekler   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy