Results 21 to 30 of about 195,253 (338)

Digital radiography image quality evaluation using various phantoms and software

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose To investigate the effect of the exposure parameters on image quality (IQ) metrics of phantom images, obtained automatically using software or from visual evaluation. Methods Three commercial phantoms and a homemade phantom constructed according to the instructions given in the IAEA Human Health Series No.
Ioannis A. Tsalafoutas   +4 more
wiley   +1 more source

A transient inflammatory response contributes to oxaliplatin neurotoxicity in mice

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1985-1998, December 2022., 2022
Abstract Objectives Peripheral neuropathy is a relevant dose‐limiting adverse event that can affect up to 90% of oncologic patients with colorectal cancer receiving oxaliplatin treatment. The severity of neurotoxicity often leads to dose reduction or even premature cessation of chemotherapy.
Aina Calls   +9 more
wiley   +1 more source

Research on Quality of Service Based Routing Protocols for Mobile Ad Hoc Networks

open access: yesJournal of ICT Research and Applications, 2020
Quality of service (QoS) based routing protocols play a significant role in MANETs to maintain proper flow of data with efficient power consumption and without data loss.
Selman Hizal, Ahmet Zengin
doaj   +1 more source

On Modeling Optimizations and Enhancing Routing Protocols for Wireless Multihop Networks

open access: yesIEEE Access, 2020
The contribution of this paper is two fold. It first analyses the flooding strategies for the Wireless Multihop Networks (WMNs) then it enhances the reactive and proactive routing protocols.
Fahad Ahmad Al-Zahrani
doaj   +1 more source

Reinforcement Learning-Based Routing Protocols in Flying Ad Hoc Networks (FANET): A Review

open access: yesMathematics, 2022
In recent years, flying ad hoc networks have attracted the attention of many researchers in industry and universities due to easy deployment, proper operational costs, and diverse applications.
Jan Lansky   +6 more
doaj   +1 more source

(In)Corruptibility of Routing Protocols [PDF]

open access: yes, 2015
Analyses of routing protocols security are nearly always supported by simulations, which often evaluate the ability to deliver messages to a given destination. Several competing definitions for secure routing exist, but to our knowledge, they only address source routing protocols.
Jamet, Raphaël, Lafourcade, Pascal
openaire   +4 more sources

A Comparative Study by Simulation of OSPF and EIGRP Routing Protocols

open access: yesИнформатика и автоматизация, 2022
Computer networks are based on technology that provides the technical infrastructure where routing protocols are used to transmit packets over the Internet.
Georgi Tsochev   +2 more
doaj   +1 more source

A Comprehensive Study on Reactive and Proactive Routing Protocols under different performance Metric

open access: yesSukkur IBA Journal of Emerging Technologies, 2019
Mobile Ad-hoc Network (MANET) has recently gained enormous studies attention because of their large potential of reliability and scalability in various fields.
Sadaf Wali   +3 more
doaj   +1 more source

Reliability Of Routing Protocols [PDF]

open access: yesJournal of KONBiN, 2015
Abstract The article refers to the impact of damage and dynamic variables on operation of routing protocols and consequently to the whole network. On this purpose, there was introduced the characteristic of the routing protocols and both an internal and an exterior gateway.
Rafał Polak, Dariusz Laskowski
openaire   +2 more sources

Bootstrapping opportunistic networks using social roles [PDF]

open access: yes, 2003
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding.
Bigwood, Greg, Henderson, Tristan
core   +8 more sources

Home - About - Disclaimer - Privacy