Results 1 to 10 of about 1,923,589 (382)

Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols [PDF]

open access: yes54th IEEE Globecom2011 (SaCoNAS Workshop), 2011
In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR).
Bibi, Ayesha   +3 more
arxiv   +4 more sources

Threat assessment of aerial targets based on improved GRA-TOPSIS method and three-way decisions

open access: yesMathematical Biosciences and Engineering, 2023
Target threat assessment is a critical aspect of information warfare and can offer valuable auxiliary support to combat command decision-making. Aiming to address the shortcomings of three decision-making methods in air combat target assessment, such as ...
Yongfeng Yin, Routing Zhang , Qingran Su
doaj   +1 more source

The role of gut archaea in the pig gut microbiome: a mini-review

open access: yesFrontiers in Microbiology, 2023
The gastrointestinal microbiota of swine harbors an essential but often overlooked component: the gut archaea. These enigmatic microorganisms play pivotal roles in swine growth, health, and yield quality.
Jianbo Yang   +12 more
doaj   +1 more source

Predicting the least air polluted path using the neural network approach [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
Air pollution exposure during daily transportation is becoming a critical issue worldwide due to its adverse effect on human health. Predicting the least air polluted healthier path is the best alternative way to mitigate personal air pollution exposure ...
K. Samal, Korra Babu, Santos Das
doaj   +1 more source

A Backtracking Ensemble Pruning Based Reconfiguration Method for Time-Triggered Flows in TTEthernet

open access: yesIEEE Access, 2021
In time-triggered ethernet (TTEthernet), when an end system node (ES) permanently fails, the affected TT flows should be reconfigured (known as reconfigured TT flows) with ESs, routings and an updated scheduling table while maintaining the scheduling ...
Ji Li, Qiao Li, Huagang Xiong
doaj   +1 more source

DDSLA-RPL: Dynamic Decision System Based on Learning Automata in the RPL Protocol for Achieving QoS

open access: yesIEEE Access, 2021
The internet of things is a worldwide technological development in communications. Low Power and Lossy Networks (LLN) are a fundamental part of the internet of things with numerous monitoring and controlling applications. This network has many challenges
Mohammad Hossein Homaei   +3 more
doaj   +1 more source

Efficient Content-Based Sparse Attention with Routing Transformers [PDF]

open access: yesTransactions of the Association for Computational Linguistics, 2020
Self-attention has recently been adopted for a wide range of sequence modeling problems. Despite its effectiveness, self-attention suffers from quadratic computation and memory requirements with respect to sequence length. Successful approaches to reduce
Aurko Roy   +3 more
semanticscholar   +1 more source

A Load Balancing Routing Strategy for LEO Satellite Network

open access: yesIEEE Access, 2020
The LEO network composed of massive satellite nodes is a hot research field at present. In such a network, the problem of load balancing should be reconsidered due to the large number of satellite nodes, the frequently changing topology, and the uneven ...
Jiang Liu   +3 more
doaj   +1 more source

payGo: Incentive-Comparable Payment Routing Based on Contract Theory

open access: yesIEEE Access, 2020
The increasing use of cryptocurrencies has raised scalability and performance issues in blockchain systems that require global consensus and security assurance for real-time payments.
Kyungho Ryu, Wooseong Kim, Eun-Kyu Lee
doaj   +1 more source

Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks

open access: yesIEEE Access, 2020
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability. Due to the less secure environment in WSN, some malicious nodes at one point can
Ohida Rufai Ahutu, Hosam El-Ocla
doaj   +1 more source

Home - About - Disclaimer - Privacy