Results 211 to 220 of about 116,208 (285)
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
Technology Development Outsourcing: When to Join Forces With a Rival?
ABSTRACT Knowing the challenges of collaborating with a competitor in developing new technologies, firms sometimes still choose a competitor instead of a noncompeting technology provider. To explore why, this study adopts an inter‐organizational trust view to explain the formation of a technology development outsourcing relationship.
Tingting Yan, Hubert Pun, Dina Ribbink
wiley +1 more source
An adaptive, energy-efficient and secure routing protocol for zone-related mobile Ad-hoc networks using reinforcement learning. [PDF]
Singh SB +5 more
europepmc +1 more source
This study aimed to quantify the spatio‐temporal use of breeding environments by the Eurasian curlew in 5 contrasting agricultural landscapes. To this end, 64 individuals were tagged with GPS devices to assess their space use according to their breeding stages and define their foraging habitat selection.
Marie Donnez +15 more
wiley +1 more source
An efficient signature aggregation scheme with antenna hardware implementation for VANETs. [PDF]
Priyadharshini A +4 more
europepmc +1 more source
ABSTRACT Osteoarthritis (OA) is a prevalent degenerative joint disease. This study combines bioinformatics analysis with in vivo and in vitro experiments to elucidate the molecular mechanisms through which melatonin (MT) regulates mitophagy to alleviate OA.
Chao Huang +4 more
wiley +1 more source
A machine learning based scheme for enhancing the detection of position falsification attacks in vehicular ad hoc networks. [PDF]
Abdelkreem E, Hussein S, Tammam A.
europepmc +1 more source
Authentication mechanism based on distributed blockchain for secure and energy efficient mobile ad-hoc networks. [PDF]
Sugumaran VR +3 more
europepmc +1 more source

