Results 51 to 60 of about 29,121 (270)
An Enhancement of Greedy Perimeter Stateless Routing Protocol in VANET
Abstract The technological development in the world has increased rapidly and touched various areas, especially communication technology, which evolves with the evolution of wireless technology. This technology has invaded several areas, including the transport sector which has benefited from a new technology allowing the communication between ...
Meriem Houmer, Moulay Lahcen Hasnaoui
openaire +1 more source
ABSTRACT This paper examines the causal impact of federal homeless‐assistance grants on reported homelessness and shelter capacity across 370 Continuums of Care in 2019. We exploit cross‐sectional variation in pre‐1940 housing shares, used in Community Development Block Grant formula allocations, as an instrument for combined CoC and Emergency ...
Luke Maddock, Anita Alves Pena
wiley +1 more source
A communication protocol is a set of rules defined formally that describes the format of digital messages and the rules for exchanging those messages in or between computing systems.
Valentin Stanciu +3 more
doaj +1 more source
Greedy Intersection-Mode Routing Strategy Protocol for Vehicular Networks
The advantages of vehicular ad hoc networks (VANETs) have been acknowledged, particularly during the last decade. Furthermore, VANET-related issues have been addressed by different researchers.
Marwan Mahmoud +1 more
doaj +1 more source
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
Perspectives On Machine Learning Inference Serving in Real‐World Settings
ABSTRACT Introduction As machine learning (ML)‐enabled systems become increasingly prevalent across industries, the engineering challenges of deploying and maintaining them in production have emerged as critical. The existing engineering knowledge base often derives from conceptual frameworks or case studies conducted by large technology companies ...
Dennis Muiruri +3 more
wiley +1 more source
Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks [PDF]
This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities.
Iyengar, S S +4 more
core +1 more source
The purpose of this study is to simulate the GPSR protocol network on NS3 using the bird flocking algorithm and to analyze the comparison of performance measurements obtained from the simulation results. The Greedy Perimeter Stateless Routing network was simulated using NS-3 in this simulation. The simulation area is created in length, width.
Nindy Ayu Marthaliana +4 more
openaire +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Accomplishing Ethics‐Work as a Generic Social Process
Existing systems of university research ethics are often criticized by those in the qualitative research tradition. A common thread is that ethics cannot be fully anticipated before the research begins, as is expected by most institutional review boards.
Deana Simonetto, Antony Puddephatt
wiley +1 more source

