Results 51 to 60 of about 1,790,881 (270)
Usability of Legacy p2p Multicast in Multihop Ad Hoc Networks: An Experimental Study
There has recently been an increasing interest in convergence of p2p and ad hoc network research. Actually, p2p systems and multihop ad hoc networks share similar features, such as self-organisation, decentralisation, self-healing, and so forth.
Passarella Andrea, Delmastro Franca
doaj +2 more sources
A Novel Stateless Authentication Protocol
The value of authentication protocols which minimise (or even eliminate) the need for stored state in addressing DoS attacks is well-established — the seminal paper of Aura and Nikander [1] is of particular importance in this context. However, although there is now a substantial literature on this topic, it would seem that many aspects of stateless ...
openaire +13 more sources
A Defense Approach of DAD Attack in Stateless Auto Configuration
In stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration ...
Guangjia Song, Zhenzhou Ji, Hui Wang
doaj +2 more sources
A geographic routing protocol based on trunk line in VANETs
A Trunk Line Based Geographic Routing(TLBGR) protocol in Vehicular Ad-hoc Networks (VANETs) is proposed in this paper to solve the problem of data acquisition in the traditional trunk coordinated control system.
Chen Chen +5 more
doaj +1 more source
ABSTRACT This qualitative study examines the aspirations, motivations and support needs of 15 young parents in South Australia with experiences of out‐of‐home care (OOHC) or homelessness. Most participants aimed to delay parenting to achieve financial stability, education and personal development, but faced unplanned pregnancies due to inadequate ...
Tim Moore, Stewart McDougall
wiley +1 more source
SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm
Resource limitations of sensor nodes in wireless sensor networks (WSN) bound the performance on its implementations. Main concern becomes utilizing these limited resources (CPU, memory, bandwidth, battery) as efficient as possible.
Mujdat Soyturk, Deniz Turgay Altilar
doaj +1 more source
A New Algorithm for High Power Node Multicasting in Wireless Sensor Networks
Multicast routing protocols normally depend upon the standard establishment of a multicast tree that needs maintenance of state information by individual nodes. In the case of dynamic networks with burst traffic, between the bursts of data, a long period
R. Santhana Krishnan +6 more
doaj +1 more source
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh +3 more
doaj +1 more source
Community kitchen managers in Lebanon demonstrated positive attitudes but insufficient knowledge and perceptions regarding food safety. Targeted training programs are urgently needed to improve critical control practices and reduce foodborne illness risks across the country.
Samer A. Kharroubi +2 more
wiley +1 more source
Local Responses to Limits on U.S. Public Health Authority During the COVID‐19 Emergency
ABSTRACT Public health has become politicized in the U.S. Though research shows that limiting public health authority during emergency response puts community wellbeing and health outcomes at risk, during the COVID‐19 emergency (2020–2021), some U.S. state policymakers limited the disease‐preventing actions local public health agencies could take. This
Genevive R. Meredith +6 more
wiley +1 more source

