Showing 461 - 480 results of 597 for search '"ad hoc"', query time: 0.06s Refine Results
  1. 461

    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim

    Published 2020-01-01
    “…Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of Things environments. …”
    Get full text
    Article
  2. 462

    Anonymous group key distribution scheme for the internet of vehicles by Zhiwang HE, Huaqun WANG

    Published 2023-10-01
    “…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
    Get full text
    Article
  3. 463

    Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs by Anitha Veerasamy, Srinivasa Rao Madane, K. Sivakumar, Audithan Sivaraman

    Published 2016-01-01
    “…Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. …”
    Get full text
    Article
  4. 464

    An Active Learning Approach with Uncertainty, Representativeness, and Diversity by Tianxu He, Shukui Zhang, Jie Xin, Pengpeng Zhao, Jian Wu, Xuefeng Xian, Chunhua Li, Zhiming Cui

    Published 2014-01-01
    “…Although several active learning algorithms have been proposed to combine the two criteria for query selection, they are usually ad hoc in finding unlabeled instances that are both informative and representative and fail to take the diversity of instances into account. …”
    Get full text
    Article
  5. 465

    Boost Full Bridge Bidirectional DC/DC Converter for Supervised Aeronautical Applications by Alberto Cavallo, Beniamino Guida, Luigi Rubino

    Published 2014-01-01
    “…Next, modulation schemes in both step-down and step-up modes are discussed. Successively ad hoc PI regulators for both operative modes are presented. …”
    Get full text
    Article
  6. 466

    Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System by Abhishek Joshi, Sarang Dhongdi, Rishabh Sethunathan, Pritish Nahar, K. R. Anupama

    Published 2017-01-01
    “…Wireless Sensor Network consists of large number of nodes densely deployed in ad hoc manner. Usually, most of the application areas of WSNs require two-dimensional (2D) topology. …”
    Get full text
    Article
  7. 467

    Vehicle location measurement method for radio-shadow area through iBeacon message by ChoonSung Nam, Dong-Ryeol Shin

    Published 2018-11-01
    “…To achieve this, we assume that vehicle-to-infrastructure communication is possible between a vehicle and roadside unit in Vehicular Ad hoc Networks. We used iBeacon at the roadside unit and revised its Universally Unique Identifier so that it generates absolute Global Positioning System location data; that is, moving vehicles can receive absolute Global Positioning System data from the roadside unit-based iBeacon. …”
    Get full text
    Article
  8. 468

    Deep-learning enabled generalized inverse design of multi-port radio-frequency and sub-terahertz passives and integrated circuits by Emir Ali Karahan, Zheng Liu, Aggraj Gupta, Zijian Shao, Jonathan Zhou, Uday Khankhoje, Kaushik Sengupta

    Published 2024-12-01
    “…These structures (radiative and non-radiative, single-port and multi-ports) are subsequently optimized through ad-hoc methods and parameter sweeps. Such bottom-up approaches with pre-selected regular topologies also fundamentally limit the design space. …”
    Get full text
    Article
  9. 469

    Logic-Based Security Architecture for Systems Providing Multihop Communication by Iman Almomani, Eman Al-Banna, Mousa AL-Akhras

    Published 2013-01-01
    “…Security is a basic element of distributed systems such as ad hoc and sensor communication networks. Several standards define security requirements and enforcers, such as ITU-T Recommendations X.800 and X.805. …”
    Get full text
    Article
  10. 470

    The family as an object of protection and a subject of law by Wojciech Lis

    Published 2024-12-01
    “…However, this requires a properly prepared, possibly comprehensive, consistently implemented and forward-looking pro-family policy, which the state has not developed because of focusing its actions on ad hoc solutions, which are not always consistent. …”
    Get full text
    Article
  11. 471

    Survey on first-line therapeutic management of relapsing–remitting multiple sclerosis in clinical practice in Spain by M. Llaneza, G. Fontes, L. Benedito-Palos, E. Moral

    Published 2025-01-01
    “…Methods: Based on a review of the literature and the experience of a scientific committee made up by 2 neurologists, an ad hoc survey was developed and distributed to Spanish neurologists. …”
    Get full text
    Article
  12. 472

    Análisis de habilidades y percepciones sobre mHealth en el manejo de pacientes crónicos por profesionales de atención primaria by Daniel Monasor Ortola, José Joaquín Mira Solves, Antonio Esteve Ríos

    Published 2025-02-01
    “…Mediciones: Se creó un formulario ad hoc anonimizado dividido en dos apartados: datos sociodemográficos y 7 preguntas sobre el uso de tecnologías de salud móvil e internet. …”
    Get full text
    Article
  13. 473

    A new strategy for measuring tourism demand features by Asensi Descals-Tormo, María-José Murgui-García, José-Ramón Ruiz-Tamarit

    Published 2024-10-01
    “…Most of the empirical modeling of tourism demand consists of ad hoc equations that are not directly attached to a specific theoretical framework. …”
    Get full text
    Article
  14. 474

    ¿Los usuarios de la práctica deportiva no competitiva presentan actitudes diferentes a los que realizan práctica federada? by Félix Lobo de Diego, Juan Carlos Manrique Arribas

    Published 2025-01-01
    “…Se aplicó un cuestionario ad hoc con una escala de tipo Likert a una muestra de 186 participantes en el deporte escolar y federado. …”
    Get full text
    Article
  15. 475

    Characterizing the role of vehicular cloud computing in road traffic management by Iftikhar Ahmad, Rafidah Md Noor, Ihsan Ali, Muhammad Imran, Athanasios Vasilakos

    Published 2017-05-01
    “…A comparison of the current state-of-the-art traffic management systems is performed in terms of parameters, such as vehicular ad hoc network infrastructure, Internet dependency, cloud management, scalability, traffic flow control, and emerging services. …”
    Get full text
    Article
  16. 476

    Russification and Russianization in Modern Historiography: Recent Developments and Future Directions by Nicholas W. Sessums

    Published 2025-01-01
    “…Instead, scholars now generally argue that policies were applied on a more ad hoc basis depending on the ethnic and national contexts of individual borderlands. …”
    Get full text
    Article
  17. 477

    A magnetorheological clutch for efficient automotive auxiliary device actuation by F. Bucchi, P. Forte, F. Frendo, R. Squarcini

    Published 2012-12-01
    “…The clutch characteristics, in terms of torque versus slip, were obtained experimentally for three different clutch prototypes on an ad-hoc developed test bench. As result of a preliminary simulation, a comparison between the power absorption of a current production vacuum pump, an innovative vacuum pump and both vacuum pumps coupled with the MR clutch is presented. …”
    Get full text
    Article
  18. 478

    TEAMWORK AND EMPLOYEE JOB SATISFACTION IN BENUE INVESTMENT AND PROPERTY COMPANY, MAKURDI, BENUE STATE by TOR NORA

    Published 2024-05-01
    “…Teamwork should be seen as an effective operational strategy and adopted not as an ad hoc strategy but one that should be sustained, BIPC should promote espirit de corp in designing tasks and activities based on team to get better and desired results, teamwork activity within the organization is very much beneficial and its effect is directly on employee performance. …”
    Get full text
    Article
  19. 479

    Formulación de proyectos sociales y atributos para el liderazgo. Miradas desde dirigentes sociales chilenos by Marcelo Andrés Gallegos Fuentes, Carmen Gloria Jarpa, Sady David Alejandro Leaman Hasbún, Héctor Agustín Vargas Muñoz

    Published 2024-01-01
    “…The information was gathered through an ad hoc survey.The results demonstrate a high appreciation in the dimension of conceptual, procedural, and practical knowledge. …”
    Get full text
    Article
  20. 480

    Fab Four: When John and George Play Gravitation and Cosmology by J.-P. Bruneton, M. Rinaldi, A. Kanfon, A. Hees, S. Schlögel, A. Füzfa

    Published 2012-01-01
    “…The latter leads to inflationary models that do not need ad hoc potentials. Further generalizations lead to a tensor-scalar theory, dubbed the “Fab Four,” with only first and second order derivatives of the fields in the equations of motion that self-tune to a vanishing cosmological constant. …”
    Get full text
    Article