Results 31 to 40 of about 1,074 (257)
A New Algorithm for High Power Node Multicasting in Wireless Sensor Networks
Multicast routing protocols normally depend upon the standard establishment of a multicast tree that needs maintenance of state information by individual nodes. In the case of dynamic networks with burst traffic, between the bursts of data, a long period
R. Santhana Krishnan +6 more
doaj +1 more source
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh +3 more
doaj +1 more source
Abstract In some communities, schools and housing agencies are innovatively partnering to prevent family homelessness and protect students from the negative outcomes associated with housing hardship. While there is increasing interest in expanding the array of housing solutions via school‐housing partnership, more research is needed to understand the ...
Jessica K. McCabe Johnson +6 more
wiley +1 more source
Greedy Intersection-Mode Routing Strategy Protocol for Vehicular Networks
The advantages of vehicular ad hoc networks (VANETs) have been acknowledged, particularly during the last decade. Furthermore, VANET-related issues have been addressed by different researchers.
Marwan Mahmoud +1 more
doaj +1 more source
Abstract Equitable community‐academic research partnerships provide an innovative way to advance health outcomes among criminal legal system‐impacted individuals. The extant literature lacks accounts that detail the process for developing such partnerships, particularly in community‐based (rather than carceral) settings and with community organizations
Talia R. Cohen +7 more
wiley +1 more source
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan +4 more
doaj +1 more source
Philanthropy and Indigenous Initiatives: Insights From Australian Donors
ABSTRACT This paper draws on a survey and interview data, collected from a group of 180 donors who made monetary gifts to an Australian higher education institution, to better understand what drives individuals and organisations to donate to Indigenous initiatives.
Celina McEwen +4 more
wiley +1 more source
A communication protocol is a set of rules defined formally that describes the format of digital messages and the rules for exchanging those messages in or between computing systems.
Valentin Stanciu +3 more
doaj +1 more source
Research on heterogeneous clustering networking protocol in 3D open-pit mine scenario
Open-pit mine networking is one of the basic key technologies of intelligent mines. However, the complex communication environment in open-pit mines and the large mobility difference of various heterogeneous nodes lead to unstable communication links. In
ZHANG Hongguang1 +5 more
doaj +1 more source
Trauma‐Informed Practice in Welfare‐to‐Work and Employment Services: A Scoping Review
ABSTRACT There is increasing recognition within welfare services, including employment services, that many participants may have histories of trauma. Research suggests that experiences of trauma not only impact individuals' psychosocial health but also vocational elements such as job performance, employability, career progression, and financial ...
Emily Corbett +3 more
wiley +1 more source

