Results 121 to 130 of about 248,355 (346)

Path‐Based Deep Reinforcement Learning for On‐Board Routing in Satellite Constellation Networks

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT Efficient usage of available network resources is a crucial factor for broadband services in interconnected satellite constellations. To meet required quality of service standards under heavy network loads, it is essential to optimize traffic distribution among the intersatellite links. To address this challenge, we propose an adaptive traffic
Manuel M. H. Roth   +4 more
wiley   +1 more source

Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab

open access: yesSymbolic Interaction, EarlyView.
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz   +2 more
wiley   +1 more source

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS [PDF]

open access: yesJournal of Engineering Science and Technology, 2009
A wireless ad hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure.
SHEENU SHARMA, ROOPAM GUPTA
doaj  

Uniform Information Exchange in Multi-channel Wireless Ad Hoc Networks [PDF]

open access: green, 2015
Li Ning   +5 more
openalex   +1 more source

Energy conserving routing in wireless ad-hoc networks

open access: yesProceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), 2000
Jae-Hwan Chang, L. Tassiulas
semanticscholar   +1 more source

Bound by blood and bloodshed: Sibling ties and participation in genocidal violence

open access: yesCriminology, EarlyView.
Abstract Focusing on the 1994 genocide in Rwanda, we examine how sibling relationships—one of the most salient familial bonds—influence individual engagement in violence during mass atrocity. Drawing on an adaptation of differential association and social learning theories for contexts of mass atrocity, we analyze a novel dataset linking over 300,000 ...
Jack G. R. Wippell   +3 more
wiley   +1 more source

FDPA internet of things system for forest fire detection, prediction and behaviour analysis

open access: yesIET Wireless Sensor Systems
The escalating issue of forest fires poses severe risks to ecosystems and human habitats, primarily due to the greenhouse effect and sudden climate changes. These fires, mostly occurring naturally, necessitate prompt detection and control.
Ahmad A. A. Alkhatib   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy