Results 31 to 40 of about 1,125 (277)
A Defense Approach of DAD Attack in Stateless Auto Configuration
In stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration ...
Guangjia Song, Zhenzhou Ji, Hui Wang
doaj +2 more sources
Usability of Legacy p2p Multicast in Multihop Ad Hoc Networks: An Experimental Study
There has recently been an increasing interest in convergence of p2p and ad hoc network research. Actually, p2p systems and multihop ad hoc networks share similar features, such as self-organisation, decentralisation, self-healing, and so forth.
Passarella Andrea, Delmastro Franca
doaj +2 more sources
ABSTRACT This qualitative study examines the aspirations, motivations and support needs of 15 young parents in South Australia with experiences of out‐of‐home care (OOHC) or homelessness. Most participants aimed to delay parenting to achieve financial stability, education and personal development, but faced unplanned pregnancies due to inadequate ...
Tim Moore, Stewart McDougall
wiley +1 more source
SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm
Resource limitations of sensor nodes in wireless sensor networks (WSN) bound the performance on its implementations. Main concern becomes utilizing these limited resources (CPU, memory, bandwidth, battery) as efficient as possible.
Mujdat Soyturk, Deniz Turgay Altilar
doaj +1 more source
A New Algorithm for High Power Node Multicasting in Wireless Sensor Networks
Multicast routing protocols normally depend upon the standard establishment of a multicast tree that needs maintenance of state information by individual nodes. In the case of dynamic networks with burst traffic, between the bursts of data, a long period
R. Santhana Krishnan +6 more
doaj +1 more source
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh +3 more
doaj +1 more source
Community kitchen managers in Lebanon demonstrated positive attitudes but insufficient knowledge and perceptions regarding food safety. Targeted training programs are urgently needed to improve critical control practices and reduce foodborne illness risks across the country.
Samer A. Kharroubi +2 more
wiley +1 more source
Barriers to contraception access and use among youth: A scoping review in high‐income countries
Abstract Background The United Nations (UN) has a target for universal contraception access by 2030. Youth (aged 15–29) still have limited contraception access and lower usage. A unified understanding of the barriers youth face in high‐income countries (HIC) remains unclear.
Bronte K. Johnston +9 more
wiley +1 more source
Incident‐Based Storytelling in Service‐Learning: Dental Learners’ Experiences and Key Insights
Abstract Background Community service‐learning (CSL) is increasingly used in education to promote oral health equity and social responsibility; however, few studies have examined how reflective incident‐based storytelling narratives shape learner development within CSL contexts.
Abbas Jessani
wiley +1 more source
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan +4 more
doaj +1 more source

