Results 101 to 110 of about 127,978 (287)
Passive security threats and consequences in IEEE 802.11 wireless mesh networks [PDF]
The Wireless Mesh Network (WMN) is ubiquitous emerging broadband wireless network. However, the open wireless medium, multi-hop multi-radio architecture and ad-hoc connectivity amongst end-users are such characteristics which increases the ...
Khan, S, Loo, KK, Mast, N, Silahuddin, A
core
Abstract Objective The current study aimed to evaluate the remote electrical neuromodulation (REN) wearable device over 3 years, assessing the potential for tachyphylaxis, consistent effectiveness, overall utilization patterns, and safety. Background Migraine is a highly prevalent chronic neurological disease, especially during peak years of ...
Stephanie J. Nahas +7 more
wiley +1 more source
Different Network Threats and Issues Based on Wireless Ad hoc Networks: A Survey Details
Virendra Dani
openalex +1 more source
Abstract The application of automated ground vehicles (AGVs) is well‐established in closed environments such as port terminals, while their operation in open areas remains challenging. In this work, we set out to overcome this limitation by introducing platooning as a transfer mode in heterogeneous vehicle networks.
Nadia Pourmohammad‐Zia +2 more
wiley +1 more source
Nonhuman situational enmeshments—How participants build temporal infrastructures for ChatGPT
Abstract This paper investigates how participants recruit Large Language Models (LLMs) like ChatGPT as interactional co‐participants depending on their temporal enmeshment within an interactional flow. Using Charles Goodwin's co‐operative action framework, we analyze video data of human–AI interaction to trace the temporal structures established by ...
Nils Klowait, Maria Erofeeva
wiley +1 more source
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li +3 more
wiley +1 more source
ABSTRACT We fuse research on incumbents' adaptation to discontinuous technologies with board capital theory to investigate how heterogeneity in incumbent firms' adoption of discontinuous technologies may be affected by what we label as outside director incumbency capital—the specific subset of social capital and human capital that outside directors ...
Simon Hensellek +4 more
wiley +1 more source
ABSTRACT Sleep is essential for normal physiological functioning, and sleep deprivation is typically compensated by increasing subsequent sleep duration and/or intensity. However, a recent study showed that barnacle geese (Branta leucopsis) exhibit seasonal variation in sleep homeostasis, with full recovery of sleep after sleep deprivation in summer ...
Robin Pijnacker +4 more
wiley +1 more source
Performance of TCP/UDP under Ad Hoc IEEE802.11
TCP is the De facto standard for connection oriented transport layer protocol, while UDP is the De facto standard for transport layer protocol, which is used with real time traffic for audio and video.
Aboelaze, Mokhtar, Petrovic, Milenko
core +1 more source
ABSTRACT Slow wave sleep plays a crucial role in overnight memory consolidation, with slow oscillations serving as a critical mechanism. Recent studies have identified closed‐loop auditory stimulation as an effective method to enhance slow oscillatory activity during slow wave sleep, thereby facilitating memory consolidation.
Angie Baldassarri +6 more
wiley +1 more source

