Research Projects Ideas Communication protocols

Communication Protocols Research Projects Ideas, Topics, and Areas

List of Communication protocols Research Topics ideas.

List of Research Topics ideas and Areas of communication protocols.

  1. Logic-based technologies for multi-agent systems: a systematic literature review
  2. Secure computation protocols under asymmetric scenarios in enterprise information system
  3. Mutual Impact between Clock Gating and High-Level Synthesis in Reconfigurable Hardware Accelerators. Electronics 2021, 10, 73
  4. Discussion Guide for the Lebet Article
  5. Study of Three-Way Solution for Node Movement in Mobile Ad Hoc Networks (MANETS)
  6. Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction
  7. Low Power Enhanced Leach Protocol to Extend WSN Lifespan
  8. Application of Practice Ambulatory Digestive Endoscopy Protocols During the Covid-19 Pandemic. how we are doing in Real Life
  9. IoT-fog-cloud based architecture for smart systems: Prototypes of autism and COVID-19 monitoring systems
  10. Discrete-Time Higher Order Sliding Mode Protocols for Leader-Following Consensus of Homogeneous Discrete Multi-Agent System
  11. IoT-Based Computational Frameworks in Disease Prediction and Healthcare Management: Strategies, Challenges, and Potential
  12. Pursuing the SDG11 Targets: The Role of the Sustainability Protocols
  13. Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach
  14. Healthcare 4.0: A voyage of fog computing with iot, cloud computing, big data, and machine learning
  15. Lifetime Optimization for a Grid-Friendly DC Fast Charge Station With Second Life Batteries
  16. Quantised scaled consensus of linear multiagent systems on faulty networks
  17. Long-distance entanglement purification for quantum communication
  18. Strong polygamy of multi-party q-expected quantum correlations
  19. Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems
  20. Development of early larviculture protocols for the melanurus wrasse Halichoeres melanurus
  21. T2 CAN: A Secure Active Network Prototype
  22. Take the mini-Internet to the next level
  23. Digitalization and digital transformation in metal forming: key technologies, challenges and current developments of industry 4.0 applications
  24. Leadership curricula and assessment in Australian and New Zealand medical schools
  25. HFE at the frontiers of COVID-19. Human factors/ergonomics to support the communication for safer care in Italy during the COVID-19 pandemic
  26. A Novel Hybrid Optimization for Cluster-Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing
  27. Effects of Providing Tailored Information About e-Cigarettes in a Web-Based Smoking Cessation Intervention: Protocol for a Randomized Controlled Trial
  28. A multi-objective home energy management system based on internet of things and optimization algorithms
  29. Success Rate of Benign Oral Squamous Papilloma Treatments After Different Surgical Protocols (Conventional, Nd:YAG, CO2 and Diode 980 nm Lasers): A 34-Year …
  30. An Energy-Efficient Trust Based Secure Data Scheme In Wireless Sensor Networks
  31. MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management
  32. A note on the Complement of Büchi Tree Automata
  33. An IoT open source platform for photovoltaic plants supervision
  34. Artificial Intelligence Evolution in Smart Buildings for Energy Efficiency
  35. Bringing AI to the edge: A formal M&S specification to deploy effective IoT architectures
  36. Computing Research Challenges in Next Generation Wireless Networking
  37. Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks
  38. New Directions in Symbolic Model Checking for Real-Time Systems
  39. A Survey of Optimization Techniques for Routing Protocols in Mobile Ad Hoc Networks
  40. Joint Beamforming and Reflecting Design in Reconfigurable Intelligent Surface-Aided Multi-User Communication Systems
  41. Utilizing a Raspberry Pi for Transmitting Image using Li-Fi Transceiver
  42. Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers
  43. PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks
  44. Operating Room Protocols and Infection Control
  45. Emerging Security Challenges for Ubiquitous Devices
  46. IoT-Based Modeling of Electronic Healthcare System Through Connected Environment
  47. Anaesthesia for Hepatico-Pancreatic-Biliary Surgery and Transplantation Communication Between HPB Anaesthetists: Meetings, Websites and Forums
  48. Qualitative research on end-of-life communication with family carers in nursing homes: A discussion of methodological issues and challenges
  49. Getting Started with Cryptanalysis
  50. A topological perspective on distributed network algorithms
  51. Planning Aerothermal Propulsion and Power Test Rigs
  52. Spatial visualization of comprehensive brain neurotransmitter systems and neuroactive substances by selective in situ chemical derivatization mass spectrometry …
  54. Research on Key Technology of Primary Protection System in Intelligent Substation
  55. Coordinated Memory: A Distributed Memory Model and its Implementation over Gigabit Networks
  56. Spectrum Aware Dynamic Slots Computation in Wireless Cognitive Radio Sensor Networks
  57. Cable Access Beyond the Hype: On residential broad-band data services over HFC networks
  58. Paediatric Oral Health during and after the COVID-19 Pandemic
  59. Virtual Private Networks, Authentication, and Wireless Security
  60. Swarming Artificial Intelligence for Networked Teams (SAINT)
  61. Past, Present, and Future of Swarm Robotics
  62. Takeoff
  63. A novel framework for unstructured meshes with optimized cell ordering using Hamiltonian paths
  64. A Supervisory Control Strategy for Improving Energy Efficiency of Artificial Lighting Systems in Greenhouses
  65. On technology-assisted energy saving: challenges of digital plumbing in industrial settings
  66. Importance of Fog Computing in Healthcare 4.0
  67. Tourism Management in Japan and Switzerland: Is Japan Leapfrogging Traditional DMO’s Models? A Research Agenda
  68. pH-Dependent Molecular Gate Mesoporous Microparticles for Biological Control of Giardia intestinalis
  69. The perinatal bereavement project: development and evaluation of supportive guidelines for families experiencing stillbirth and neonatal death in Southeast …
  70. EXTENDED ABSTRACT Remote Procedure Call Implementations Of Micro-kernel Virtual
  71. Applicability of Squeezed-and Coherent-State Continuous-Variable Quantum Key Distribution over Satellite Links
  72. Secure Data Transmission in Mobile Networks Using Modified S-ACK Mechanism
  73. Analytic quantum weak coin flipping protocols with arbitrarily small bias
  74. Gesture-Based Interaction of Humans with Dual Arm Robot
  75. Performance Comparison of Various Techniques for Secure Data Communication in VANET
  76. Quantum Internet-Applications, Functionalities, Enabling Technologies, Challenges, and Research Directions
  77. RAP Model—Enabling Cross-Layer Analysis and Optimization for System-on-Chip Resilience
  78. Broadcast and minimum spanning tree with o (m) messages in the asynchronous CONGEST model
  79. Error probability in polarization sensitive communication systems in terms of moments of the channel’s rotation angle
  80. [TXT][TXT] Conference on Object-Oriented Technologies (COOTS) Toronto, Ontario, Canada, June 1996.
  81. Design, Fabrication, and Testing of Dandelion-Inspired Flying Sensors for Mars Exploration
  82. Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher
  83. Volcano crisis management at Piton de la Fournaise (La Réunion) during the COVID-19 lockdown
  84. Adapting Research Protocols in Response to E-Cigarette, or Vaping, Product Use Associated Lung Injury: A Response to CDC Recommendations for E-Cigarette …
  85. ‘It isn’t my area.’Coaches’ awareness of concussion protocols in Scottish youth football
  86. Using metaprisms for performance improvement in wireless communications
  87. United in diversity? Digital differences and inequalities within a South African rural community
  88. The FORA fog computing platform for industrial IoT
  89. Computational Hardness of Collective Coin-Tossing Protocols
  90. Context-Aware Security for 6G Wireless The Role of Physical Layer Security
  91. An Efficient and Secure User Authentication Protocol for Smart Card Users
  92. Socket Programming
  93. Fuzzy wavelet neural control with improved prescribed performance for MEMS gyroscope subject to input quantization
  94. A New Proposed TCP for Faster Transmission of Packets
  95. Limits and security of free-space quantum communications
  96. Effectiveness of a Two-Tier Family-Oriented Intervention in Enhancing the Family Functioning and Care Capacity of the Family Caregivers of Stroke Survivors …
  97. Electronic Healthcare System: Mental Disorder Assessment and Intervention with Self-Treatment Using Rule-Based Techniques
  98. Issues with Belt Guidance and Device Controls in the Automated Conveyor and Drive Belt Perforation Process
  99. Beamforming and Spatial Multiplexing Performance Evaluation in 5G Ultra-Dense Networks
  100. In Vivo and Ex Vivo Patient-Derived Tumor Xenograft Models of Lymphoma for Drug Discovery
  101. Performance Evaluation of the DTM Fast Circuit Switched Networking Technology
  102. Catalyst-Controlled Regiodivergent C- H Alkynylation of Thiophenes
  103. Towards efficient verification of population protocols
  104. The Allosteric Effect in Antibody-Antigen Recognition
  105. Language Sample Collection and Analysis in People Who Use Augmentative and Alternative Communication: Overcoming Obstacles
  106. Selfie: reflections on TLS 1.3 with PSK
  107. SoK: Security and Privacy in the Age of Commercial Drones
  108. Green ICT Communication, Networking and Data Processing
  109. HKMS-AMI: A Hybrid Key Management Scheme for AMI Secure Communication
  110. A Multi-Agent System for Data Fusion Techniques Applied to the Internet of Things Enabling Physical Rehabilitation Monitoring
  111. TT&C and Communication Technology
  112. Advanced Spatial Modulation for Hybrid FSO/RF Communication
  113. Fault-tolerant consensus of nonlinear multi-agent systems with directed link failures, communication noise and actuator faults
  114. Impact of Nutrition Education on the Nutrition Capacity of Caregivers and Nutrition Outcomes of Indigenous Mbororo Children in the West Region of …
  115. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
  116. Yarning as protected space: relational accountability in research
  117. Communities of practice as purveyors of instructional communication during crises
  118. Local algorithms for bounded degree sparsifiers in sparse graphs
  119. IoT Platform for Energy Sustainability in University Campuses
  120. Peer-to-peer energy systems for connected communities: A review of recent advances and emerging challenges
  121. A Supervisory Control Strategy for Improving Energy Efficiency of Artificial Lighting Systems in Greenhouses. Energies 2021, 14, 202
  122. Communication and Dissemination in Citizen Science
  123. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges
  124. Nesnelerin Internetinde Kullanilan Kablosuz Algilayici Cihazlar için Bilgi Merkezli Ag Mimarisinin Uygulanabilirligi Arastirmasi
  125. Performance Optimization of MANET Networks through Routing Protocol Analysis
  126. A Robust Self-Organizing Tree-Based Routing Protocol for Wireless Sensor Networks
  127. Survey on aerial radio access networks: Toward a comprehensive 6G access infrastructure
  128. Dynamic directional routing for mobile wireless sensor networks
  129. GrADyS: Exploring movement awareness for efficient routing in Ground-and-Air Dynamic Sensor Networks
  130. Estimating Energy Consumption for Various Sensor Node Distributions in Wireless Sensor Networks
  131. Vehicle Direction-Based B-MFR Routing Protocol for VANET
  132. Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
  133. An Effect of Sharing Damaged Road Information via Heterogeneous DTN on Evacuation
  134. Shape changing robots: Bioinspiration, simulation, and physical realization
  135. Internet of things and cloud computing-based energy management system for demand side management in smart grid
  136. Blockchain Applications in Microgrid Clusters
  137. A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET
  138. Master–slave synchronization of neural networks via event-triggered dynamic controller
  139. BAA Number: BAA98-02 Proposed Integration Role: RESEARCH OPERATING SYSTEMS
  140. Provincialising smart urbanism in Taipei: The smart city as a strategy for urban regime transition
  141. The Canadian Fungal Research Network: current challenges and future opportunities
  142. China Mobile in Action
  143. ESP32 microcontroller features
  144. How the COVID-19 pandemic will change the future of critical care
  145. Communication and interprofessional collaboration in primary care: From ideal to reality in practice
  146. A Critical Review: SANET and Other Variants of Ad Hoc Networks
  147. Deciphering the Complex Communication Networks That Orchestrate Pancreatic Islet Function
  148. Robust parameter design of human induced pluripotent stem cell differentiation protocols defines lineage-specific induction of anterior-posterior gut tube endodermal …
  149. Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions
  150. Modelling and Simulation of Autonomous Indoor Robotic Wastebin in Webots for Waste Management in Smart Buildings
  151. Physical layer security: Authentication, integrity, and confidentiality
  152. An outline of communication theory and systems
  153. Testing Autogenerated OPC UA NodeSet Models for Product Variants in Industry
  154. PODC 2020 Review
  155. Wide-area power oscillation damper for DFIG-based wind farm with communication delay and packet dropout compensation
  156. Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things
  157. Practical research on college English vocabulary teaching with mobile technology
  158. Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
  159. The role of relational worry due to COVID-19 in the links between video chat apprehension, loneliness, and adhering to CDC guidelines
  160. Beyond performance and protocols: early responders’ experiences of multiple accountability demands in the response to the 2015 Nepal earthquake
  161. Physical layer authentication for automotive cyber physical systems based on modified HB protocol
  162. fink, a new generation of broker for the LSST community
  163. Smart Transportation: A Reference Architecture for Big Data Analytics
  164. … administration of the Katholieke Universiteit Leuven is greatly appreciated. I also want to acknowledge my colleagues in the Secure Protocols work pack-age of …
  165. Knowledge, experiences and attitudes of dental health professionals towards reporting child abuse in Western Australia
  166. Verifying Learning-Augmented Systems
  167. MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices
  168. Cloud based efficient authentication for mobile payments using key distribution method
  170. Inter-UAV Routing Scheme Testbeds
  171. Vulnerabilities in Fog/Edge Computing from Architectural Perspectives
  172. Glossary on atmospheric electricity and its effects on biology
  173. Tight upper bound on the quantum value of Svetlichny operators under local filtering and hidden genuine nonlocality
  174. Internet of people enabled framework for evaluating performance loss and resilience of urban critical infrastructures
  175. Composite Routing Approach for Vehicular Delay-Tolerant Networks
  176. Dynamic Analysis on Crypto-ransomware by using Machine Learning: GandCrab Ransomware
  177. Chromatin tracing and multiplexed imaging of nucleome architectures (MINA) and RNAs in single mammalian cells and tissue
  178. A non-linear mathematical model-based routing protocol for WBAN-based health-care systems
  179. Pleiotropic anticoagulant functions of protein S, consequences for the clinical laboratory. Communication from the SSC of the ISTH
  180. Representation of Syrian Children in Turkish Media From a Child-Oriented Rights Journalism Perspective
  181. Interviewers’ perceptions of interviewing aboriginal Australian children
  182. The Internet of Things for Healthcare: Applications, Selected Cases and Challenges
  183. Recent Paradigms for Efficient Spectrum Sensing in Cognitive Radio Networks: Issues and Challenges
  184. Node Isolation Attack on OLSR, Reputation Relied Mitigation
  185. Retrofitting a Process Plant in an Industry 4.0 Perspective for Improving Safety and Maintenance Performance
  186. Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities
  187. Azure Network Security Configuration
  188. REACT: Distributed Mobile Microservice Execution Enabled by Efficient Inter-Process Communication
  189. Towards Integrated Digital Twins for Industrial Products: Case Study on an Overhead Crane
  190. Contribution Claims
  191. Using Concurrent Role-Based Script Interpretation for Dynamic Agent Coordination
  192. Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication
  193. Microfluidic integration of regeneratable electrochemical affinity-based biosensors for continual monitoring of organ-on-a-chip devices
  194. Wireless Networks Between Security and Efficiency
  195. Fixed-time bipartite synchronization with a pre-appointed settling time over directed cooperative–antagonistic networks
  196. A Secure Communication and Location Privacy in WSN Using Grey Wolf Optimization
  197. Fusion of Federated Learning and Industrial Internet of Things: A Survey
  198. IT-Supported Solution to Design Energy Efficient Retrofitting Projects at District Scale
  199. Implementation of a geographical routing scheme for low Earth orbiting satellite constellations using intersatellite links
  200. Creating Trust in Collaborative Embedded Systems
  201. A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET. Sustainability 2021, 13, 400
  202. Norms and Social Network–Centric Behavior Change Intervention (Nam Nalavazhvu) for Improved Toilet Usage in Peri-Urban Communities of Tamil Nadu …
  203. Resource Allocation Algorithm for Power Bottom-Guaranteed Communication Network Based on Network Characteristics and Historical Data
  204. Isolation and characterization of extracellular vesicles produced by cell lines
  205. Efficiency of different synchronization protocols on oestrous response and rhythmic changes in 17ß-oestradiol and progesterone hormone concentration in Salem …
  206. A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges
  207. On Resource Allocation of Cooperative Multiple Access Strategy in Energy-Efficient Industrial Internet of Things
  208. Using Information and Communication Technologies (ICT) for Mental Health Prevention and Treatment
  209. Measure and detection of genuine multipartite entanglement for n-partite systems
  210. Front-line nursing home staff experiences during the COVID-19 pandemic
  211. Design and Implementation of Indoor Positioning Performance Test System for IoT Intelligent Communication Terminal
  212. Plant Growth Measurement System Using Image Processing
  213. Traffic Type Recognition Method for Unknown Protocol—Applying Fuzzy Inference
  214. Optimizing ECMO Teams: What Every ECMO Educator Needs to Know About the Latest Advances in Team Science
  215. Energy management for internet of things via distributed systems
  216. Comparison of vitrification protocols in immature equine oocytes
  217. Development of an Emergency Department–Based Intervention to Expand Access to Medications for Opioid Use Disorder in a Medicaid Nonexpansion …
  218. Perspective of comprehensive and comprehensible multi-model energy and climate science in Europe
  219. Investigating Users’ and Other Stakeholders’ Needs in the Development of a Personalized Integrated Care Platform (PROCare4Life) for Older People with …
  220. A novel approach to data integrity auditing in PCS: Minimising any Trust on Third Parties (DIA-MTTP)
  221. Vulnerability of the synchronization process in the quantum key distribution system
  222. Retention of the Aboriginal Health, Ageing, and Disability Workforce: Protocol for a Mixed Methods Study
  223. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts
  224. Coordination of autonomous vehicles: taxonomy and survey
  225. Routing Algorithms for Hybrid Nodes in WSNs
  226. Speeding up Block Propagation in Blockchain Network: Uncoded and Coded Designs
  227. State Machines and Modeling of Mathematical and Physical Problems by State Machines
  228. Improved Store-Carry-Forward Scheme for Information Dissemination in Unfavorable Vehicular Distribution
  229. Intelligent Characterization of Lentil Genetic Resources: Evolutionary History, Genetic Diversity of Germplasm, and the Need for Well-Represented Collections
  230. Smarter Pills: Low-Cost Embedded Device to Elders
  231. Using Flow Disruptions to Examine System Safety in Robotic-Assisted Surgery: Protocol for a Stepped Wedge Crossover Design
  232. Simultaneous navigation and radio mapping for cellular-connected UAV with deep reinforcement learning
  233. Modeling and implementation of a digital twin of material flows based on physics simulation
  234. Dynamic Demand Response Through Decentralized Intelligent Control of Resources
  235. Integration of Blockchain and Remote Database Access Protocol-Based Database
  236. Performance enhancement in wireless body area networks with secure communication
  237. Optimal Relay Selection Scheme with Multiantenna Power Beacon for Wireless-Powered Cooperation Communication Networks
  238. Determining node duty cycle using Q-learning and linear regression for WSN
  239. Projected material requirements for the global electricity infrastructure–generation, transmission and storage
  241. Fate-Patterning of 2D Gastruloids and Ectodermal Colonies Using Micropatterned Human Pluripotent Stem Cells
  242. Event-Triggered Discrete-Time Higher Order Sliding Mode Protocol for Leader-Following Consensus of Homogeneous DMAS
  243. Staying connected under fire: Effects of individual roles and organizational specialization on the robustness of emergency-phase communication networks
  244. Satellite quantum communications: Fundamental bounds and practical security
  245. A two element MIMO antenna for sub-6 GHz and mmWave 5G systems using characteristics mode analysis
  246. DDoS Attacks Impact on Data Transfer in IOT-MANET-Based E-Healthcare for Tackling COVID-19
  247. Unified scheduling for predictable communication reliability in cellular networks with D2D Links
  248. Wireless and mobile device security
  249. Transmission Errors in Screen-Camera Link System
  250. Bluetooth-Based Smart Sensor Networks
  251. Global Organizations in Action
  252. An agenda for open science in communication
  253. Architectures for Dynamically Coupled Systems
  254. Quantum control in open and periodically driven systems
  255. Device-centric adaptive data stream management and offloading for analytics applications in future internet architectures
  256. A Time-Synchronized ZigBee Building Network for Smart Water Management
  257. Advanced lighting controls: energy savings, productivity, technology and applications
  258. Advanced Spatial Modulation for FSO Communication
  259. Group consensus via pinning control for a class of heterogeneous multi-agent systems with input constraints
  260. Secure and Energy-Efficient Data Transmission
  261. Internet of Things (IoT) Enabling Technologies and Applications—A Study
  262. Incentive Price-Based Demand Response in Active Distribution Grids
  263. ePassport and eID Technologies
  264. Energy Efficient Cluster Head Selection for Wireless Sensor Network Using Fuzzy Logic
  265. Cryptography Libraries in C/C++ 20
  266. BuildCOM: automated auditing and continuous commissioning of next generation building management systems
  267. E cient Data Sharing with Conditional Remote Memory Transfers
  268. On Modeling and Performability Evaluation of Time Varying Communication Networks
  269. Preliminaries of Sliding Mode Control and Graph Theory
  270. A Hardware Pseudo-Random Number Generator Using Stochastic Computing and Logistic Map
  271. Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection
  272. “A Generalised Grouping Framework for Multicast Communication
  273. Codedprivateml: A fast and privacy-preserving framework for distributed machine learning
  274. Designing a Clinical Trial Protocol about the Impact of Family-Based Multimedia Education Based on Telephone Tracking (Tele Nursing) to Improve the …
  275. A secure IoT sensors communication in industry 4.0 using blockchain technology
  276. Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration
  277. Extended Security in Heterogeneous Distributed SDN Architecture
  278. A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks
  279. Smart Grid/Community Load Shifting GA Optimization Based on Day-ahead ANN Power Predictions
  280. International comparison of guidelines for managing neonates at the early phase of the SARS-CoV-2 pandemic
  281. Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic
  282. Evaluating PVM and Express on Various Network Clusters
  283. Studying resilient action strategies of first line managers
  284. Blockchain-Based Security Services for Fog Computing
  285. Making communication: A theoretical framework for educating end-users of online bibliographic information retrieval systems
  286. Safety rule-based cellular automaton modeling and simulation under V2V environment
  287. Traffic Queuing Management in the Internet of Things: An Optimized RED Algorithm Based Approach
  288. TeCo 3D-A tool for 3D-based telecooperation
  290. Packet Priority-Based Routing Approach for Vehicular Delay Tolerant Network
  291. Performance analysis of two-way wireless-powered Amplify-and-Forward relaying in the presence of co-channel interference
  292. Impact of Limited Health Literacy on Patient-Reported Outcomes in Systemic Lupus Erythematosus
  294. Cooperative output regulation of heterogeneous linear multi-agent systems based on the event-triggered distributed control under switching topologies
  295. Design and Rationale for the Deep South Interactive Voice Response System–Supported Active Lifestyle Study: Protocol for a Randomized Controlled Trial
  296. On-Demand Joint Predictive Flooding in Vehicular Ad Hoc Networks
  297. Fast and robust magnon transport in a spin chain
  298. Fundamentals of communications and networking
  299. Efficient Distributed Decryption Scheme for IoT Gateway-based Applications
  300. Understanding and Adapting to Leadership Challenges: Navigating the COVID-19 Crisis in the Bronx
  301. Dos attacks on cloud platform: Their solutions and implications
  302. Lessons from Italian front-line nurses’ experiences during the COVID-19 pandemic: A qualitative descriptive study
  303. Correcting “PALK: Password-based anonymous lightweight key agreement framework for smart grid”
  304. Verification of A Key Chain Based TTP Transparent CEM Protocol
  305. Ultra-lightweight Authentication
  306. A decidable class of security protocols for both reachability and equivalence properties
  307. Demand Response in Smart Zero Energy Buildings and Grids
  308. Swarm intelligence and cyber-physical systems: concepts, challenges and future trends
  309. Design Patterns and Electric Vehicle Charging Software
  310. Improve energy-efficiency of sensors using cross-layer design technique in WSNs
  311. The Ontological Interpretation of Informational Privacy
  312. IoT Forensics: An Overview of the Current Issues and Challenges
  313. Thermal Management and Communication Virtualization for Reliability Optimization in MPSoCs
  314. An SDN-Based Distributed Identifier Locator Separation Scheme for IoT Networks
  315. Considerations in Surgical Management of Gastrointestinal Cancer in Older Patients
  316. Turbo-aggregate: Breaking the quadratic aggregation barrier in secure federated learning
  317. Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
  318. IoT/cloud-enabled smart services: A review on QoS requirements in fog environment and a proposed approach based on priority classification technique
  319. On the use of simulation in robotics: Opportunities, challenges, and suggestions for moving forward
  320. Methods of cyber-attack identification for power systems based on bilateral cyber-physical information
  321. MAFCA: Mobility-Aware Fuzzy Clustering Algorithm for Wireless Sensor Networks
  322. Narrowband Internet of Things
  323. Optimizing methods for bovine dental pulp decellularization
  324. Spring microservices in action
  325. Discovery and Deterrence of Black Hole Attack in Clustering Ad Hoc Networks Based on Software Agents
  326. Development of an Ethernet-Based Heuristic Time-Sensitive Networking Scheduling Algorithm for Real-Time In-Vehicle Data Transmission
  327. Personal Accounts of Young-Onset Colorectal Cancer Organized as Patient-Reported Data: Protocol for a Mixed Methods Study
  328. The Critical Role of Simulation in ECMO Education
  329. Providing high resolution data for the long-term ecosystem research infrastructure on the national and European scale
  330. Mobile Health Intervention in the Maternal Care Pathway: Protocol for the Impact Evaluation of hAPPyMamma
  331. Perspectives of Blockchain in the Education Sector Pertaining to the Student’s Records
  332. Sharing C-band Frequency Between Satellite and Terrestrial 5G Communication Systems
  333. Modeling and analysis of multi-class threshold-based queues with hysteresis using Stochastic Petri Nets
  334. Elektrikli Araç Sarj Ünitesi için OCCP ile Yazilim Uygulamasi
  335. Full-scene network security protection system based on ubiquitous power Internet of things
  336. Jordan Zweck. Epistolary Acts: Anglo-Saxon Letters and Early English Media
  337. ARIOR: Adaptive Ranking Based Improved Opportunistic Routing in Wireless Sensor Networks
  338. Continuous variable quantum entanglement in optomechanical systems: A short review
  340. Controlling Supervised Industry 4.0 Processes through Logic Rules and Tensor Deformation Functions
  341. Theory of quantum system certification
  342. [TXT][TXT] New York, New York, July 1995
  343. Emergency remote education experiment amid COVID-19 pandemic
  344. Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks
  345. On the Best-Partition Communication Complexity
  346. High performance logistic regression for privacy-preserving genome analysis
  347. Cell-Type-Specific Proteomics Analysis of a Small Number of Plant Cells by Integrating Laser Capture Microdissection with a Nanodroplet Sample Processing …
  348. Consequences of suboptimal communication for patients with limited English proficiency in the intensive care unit and suggestions for a way forward: A qualitative …
  349. Preface to the Focus Section on Seismic Monitoring during Crises
  350. Autonomous vehicles
  351. Poseidon: A Distributed Information System for Ocean Processes
  352. Review analysis on cloud computing based smart grid technology in the oil pipeline sensor network system
  353. V2X Communication based Dynamic Topology Control in VANETs
  354. Modeling of Universal Access Transceiver ADS-B Performance Capabilities in High-Density Airspace
  355. DACASN: Dynamic ant routing-based channel accessing cognitive sensor network in Internet of Things
  356. Public Key Infrastructure
  357. Quantum Conference Key Agreement with Photon Loss
  358. SCADA and GIS Systems for Monitoring and Managing Digital Objects of Agro-Industrial Production
  359. A comparison of mechanisms for compensating negative impacts of system integration
  360. Conceptualizing interactional learning targets for the second language curriculum
  361. Energy Efficient Inactive Node Detection Based Routing Protocol for Delay Tolerant Network
  362. Interpersonal Perception of Time-Use Patterns in Romantic Relationships: Protocol for the IP-COUPLES Study
  363. Energy Management and Monitoring Using IoT with CupCarbon Platform
  364. Creating Respectful Workplaces for Nurses in Regional Acute Care Settings: Protocol for a Sequential Explanatory Mixed Methods Study
  365. Blockchain Integrated Secured Scenarios in Advanced Wireless Networks
  366. Impact of Face-to-Face Teaching in Addition to Electronic Learning on Personal Protective Equipment Doffing Proficiency in Student Paramedics: Protocol for …
  367. SmartWalk BAN: Using Body Area Networks to Encourage Older Adults to Perform Physical Activity
  368. Vulnerable road users and the coming wave of automated vehicles: Expert perspectives
  369. Distributed genetic algorithm for lifetime coverage optimisation in wireless sensor networks
  370. Geographic routing with hybrid firefly algorithm and galactic swarm optimization for efficient ‘void’handling in mobile ad hoc networks
  371. An Identifier and Locator Decoupled Multicast Approach (ILDM) Based on ICN
  372. Digital Epidemiologic Research on Multilevel Risks for HIV Acquisition and Other Health Outcomes Among Transgender Women in Eastern and Southern …
  373. Contemporary use of real-world data for clinical trial conduct in the United States: a scoping review
  374. Cross-insitutional standardization of imaging protocols–A pilot study within the scope of the Comprehensive Cancer Center Lower Saxony
  375. Protocolos de Comunica cão em Circuitos Integrados: Experi^ encias e Resultados
  376. Katalysatorkontrollierte regiodivergente C-H-Alkinylierung von Thiophenen
  377. Une analyse du protocole PGM avec UPPAAL1

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top