Results 11 to 20 of about 167,869 (292)
Detection of Fog Network Data Telemetry Using Data Plane Programming [PDF]
Fog computing has been introduced to deliver Cloud-based services to the Internet of Things (IoT) devices. It locates geographically closer to IoT devices than Cloud networks and aims at offering latency-critical computation and storage to end-user ...
+3 more
core +1 more source
Movements and Diving Behavior of the Eastern North Pacific Offshore Killer Whale (Orcinus orca)
The Pacific Offshore killer whale population is currently listed as data deficient on the IUCN Red List and Threatened in Canada. The population is estimated at 300 individuals with a range extending from Southern California to the Aleutian Islands in ...
Gregory S. Schorr +6 more
doaj +1 more source
Using AIS data to mine the dynamic characteristics of fishery resource exploitation helps to carry out scientific management of fishery and realize the sustainable development of marine resources. We proposed a framework that integrates multiple AIS data
Yanan Guan +16 more
doaj +1 more source
Testing the consistency of wildlife data types before combining them: the case of camera traps and telemetry. [PDF]
Wildlife data gathered by different monitoring techniques are often combined to estimate animal density. However, methods to check whether different types of data provide consistent information (i.e., can information from one data type be used to predict
Popescu, Viorel +2 more
core +2 more sources
Collisions with ships (ship strikes) are a pressing conservation concern for fin whales (Balaenoptera physalus) along western North America. Fin whales exhibit strong diel patterns in dive behavior, remaining near the surface for most of the night, but ...
Eric M. Keen +5 more
doaj +1 more source
An Improved Attack on the Basic Merkle–Hellman Knapsack Cryptosystem
Knapsack problem is a famous NP-complete problem, which is believed to be difficult to be solved even by a quantum computer. Hence, this type of cryptosystem is a good candidate for post-quantum cryptography.
Jiayang Liu, Jingguo Bi, Songyan Xu
doaj +1 more source
This paper presents the modeling of the networks supporting today’s telemetry. The incorporation of networking features has significantly enhanced the capability and performance of modern telemetry systems.
Wondimu Zegeye +4 more
doaj +1 more source
To ensure personnel safety and prevent serious accidents, it is crucial to monitor parameters such as temperature, pressure, and gas composition concentrations in confined spaces.
Xiangyu Zhong +6 more
doaj +1 more source
More than pills: alternative adjunct therapies to improve comfort in hospitalised patients
Discomfort in the hospitalised patient continues to be one of the healthcare system’s greatest challenges to positive patient outcomes. The patients’ ability to focus on healing is impaired by discomforts such as pain, nausea and anxiety.
Matthew Jones +9 more
doaj +1 more source
A Comprehensive Survey on UAV Communication Channel Modeling
Unmanned aerial vehicles (UAVs) have stroke great interested both by the academic community and the industrial community due to their diverse military applications and civilian applications.
Chaoxing Yan +3 more
doaj +1 more source

