Results 51 to 60 of about 154,858 (335)

Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks

open access: yesEnergies, 2020
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the attacks, adversaries analyze the traffic pattern to obtain critical information such as the location information of a source node.
Lilian C. Mutalemwa, Seokjoo Shin
doaj   +1 more source

On Link Availability Probability of Routing Protocols for Urban Scenario in VANETs

open access: yes, 2012
This paper presents the link availability probability. We evaluate and compare the link availability probability for routing protocols; Ad hoc On-demand Distance vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) for different ...
Javaid, N.   +5 more
core   +1 more source

Decrypting cancer's spatial code: from single cells to tissue niches

open access: yesMolecular Oncology, EarlyView.
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik   +4 more
wiley   +1 more source

Bio-Inspired Multi-Objective Algorithms Applied on the Optimization of the AODV’s Routing Recovery Mechanism

open access: yesIEEE Access, 2023
Advances in electronic systems, wireless communication protocols, and intelligent devices allowed the development of networks of mobile devices such as cars, drones, and robots.
Clodomir Santana   +6 more
doaj   +1 more source

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks [PDF]

open access: yes, 1999
A Mobile Ad hoc NETwork (manet) is a mobile, multi-hop wireless network which is capable of autonomous operation. It is characterized by energy-constrained nodes, bandwidth-constrained, variable-capacity wireless links and dynamic topology, leading ...
Feeney, Laura Marie
core   +2 more sources

Hybrid Scenario Based Performance Analysis of DSDV and DSR

open access: yes, 2010
The area of mobile ad hoc networking has received considerable attention of the research community in recent years. These networks have gained immense popularity primarily due to their infrastructure-less mode of operation which makes them a suitable ...
Majumder, Koushik, Sarkar, Subir Kumar
core   +1 more source

Interaction of class III cellobiose dehydrogenase with lytic polysaccharide monooxygenase

open access: yesFEBS Open Bio, EarlyView.
The activity of lytic polysaccharide monooxygenase (LPMO) is supported by its auxiliary enzyme cellobiose dehydrogenase (CDH). The catalytic activity of both enzymes is coupled by electron transfer and a cyclic cascade generating substrates for both enzymes – hydrogen peroxide for LPMO and oxidized and non‐oxidized cellobiose and cello‐oligosaccharide ...
Angela Giorgianni   +4 more
wiley   +1 more source

Research on Routing Protocol of Mobile Ad Hoc Network

open access: yesMATEC Web of Conferences, 2016
Routing protocol is an important content of mobile Ad Hoc. The typical mobile Ad Hoc network routing protocols is introduced. The advantages and disadvantages of these routing protocols are analyzed. A hybrid routing protocol is put forward based on this.
Tuo Ming Fu, Che Min
doaj   +1 more source

Enhanced Cluster Based Routing Protocol for MANETS

open access: yes, 2012
Mobile ad-hoc networks (MANETs) are a set of self organized wireless mobile nodes that works without any predefined infrastructure. For routing data in MANETs, the routing protocols relay on mobile wireless nodes.
H. Safa   +5 more
core   +1 more source

Macro-routing: a new hierarchical routing protocol [PDF]

open access: yesIEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2005
In a continually evolving Internet, tools such as quality of service routing must be used in order to accommodate user demands. QoS routing raises scalability issues within very large networks, which can he avoided by using hierarchical routing strategies. However, such strategies can lead to inaccurate path selection due to the aggregation process. To
Dragos, Sanda-Maria, Collier, Martin
openaire   +2 more sources

Home - About - Disclaimer - Privacy