Results 81 to 90 of about 101,732 (243)

Engine performance characteristics and evaluation of variation in the length of intake plenum [PDF]

open access: yes, 2020
In the engine with multipoint fuel injection system using electronically controlled fuel injectors has an intake manifold in which only the air flows and, the fuel is injected into the intake valve.
Abu Bakar, Muhammad Azman   +4 more
core  

A Decade of Post‐Fire Succession Amplifies the Effect of Wildfire on the Surface Radiation Balance and Permafrost Thaw in Subarctic Peatlands

open access: yesPermafrost and Periglacial Processes, Volume 37, Issue 1, Page 124-142, January/March 2026.
ABSTRACT Increasing wildfire activity is driving permafrost thaw in subarctic peatlands across the southern Northwest Territories, but the key mechanisms and progression of thaw following fire remain poorly understood. In response, 10 years (2015–2024) of near‐continuous surface (four‐component radiation, wind, and snow) and subsurface measurements ...
Maude Auclair   +4 more
wiley   +1 more source

Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services [PDF]

open access: yes, 2013
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication
Duquennoy, Simon   +6 more
core   +1 more source

Distributed Anomaly Detection using Autoencoder Neural Networks in WSN for IoT

open access: yes, 2018
Wireless sensor networks (WSN) are fundamental to the Internet of Things (IoT) by bridging the gap between the physical and the cyber worlds. Anomaly detection is a critical task in this context as it is responsible for identifying various events of ...
Luo, Tie, Nagarajan, Sai G.
core   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Is There Light at the Ends of the Tunnel? Wireless Sensor Networks for Adaptive Lighting in Road Tunnels [PDF]

open access: yes, 2011
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a key component of a closed-loop control system for adaptive lighting in ...
Ceriotti, Matteo   +13 more
core   +4 more sources

Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks

open access: yes, 2012
Data aggregation in intermediate nodes (called aggregator nodes) is an effective approach for optimizing consumption of scarce resources like bandwidth and energy in Wireless Sensor Networks (WSNs).
Sen, Jaydip
core   +1 more source

Demo Abstract: Generation of Controllable Radio Interference for Protocol Testing in Wireless Sensor Networks [PDF]

open access: yes, 2009
GINSENGCONETReSens
Boano, Carlo Alberto   +5 more
core   +1 more source

A GRASP Meta-Heuristic for Evaluating the Latency and Lifetime Impact of Critical Nodes in Large Wireless Sensor Networks

open access: yesApplied Sciences, 2019
Wireless Sensor Networks (WSN) have lately been gaining momentum thanks to the hardware improvements and standardization software efforts. Moreover, the appearance of Internet of Things (IoT) and its reliance on sensors are helping to widely extend the ...
David Sembroiz   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy