Improving cache effectiveness based on cooperative cache management in MANETs

A Larbi, L Bouallouche-Medjkoune… - Wireless Personal …, 2018 - Springer
Abstract In wireless mobile Ad Hoc networks, cooperative cache management is considered
as an efficient technique to increase data availability and improve access latency. This …

Key Technology of Electronic Nose Gas Recognizer Based on Wireless Sensor Networks.

M Hong - International Journal of Online Engineering, 2018 - search.ebscohost.com
Electronic nose gas recognizer is a kind of instrument simulating biological olfactory function
for gas detection, which is widely applied in underground construction, aerospace, medical …

Multimedia Data Transmission in MANETs Using the ACO-GWO Based AOMDV Protocol.

AR PATIL, GM BORKAR - Adhoc & Sensor Wireless …, 2023 - search.ebscohost.com
A Mobile ad-hoc network (MANET) is highly efficient to provide network services. Due to the
dynamic behavior of the network, routing protocols have some design issues that affect …

Blockchain-enabled intelligent Internet of Things system for secured healthcare applications

S Thapliyal, M Wazid, DP Singh - Ubiquitous and Transparent …, 2024 - taylorfrancis.com
Cybercriminals are now focusing on the healthcare industry. As a result, many methods are
employed to safeguard the confidential information in the healthcare system. Different …

Understanding the security, privacy, and surveillance conundrum in “digital India”

V Singh, V Malik, R Mittal - Ubiquitous and Transparent Security, 2024 - taylorfrancis.com
According to a Statista report, the cyberspace population reached more than half the world's
human population with 4.66 b active Internet users (59.5% of the human population) as of …

Towards the 21st century

P Sumitra, S Sabitha, M Sathiya, G Sathya… - Ubiquitous and …, 2024 - books.google.com
Teaching strategies and learning models have evolved as a result of the preface of
information technologies and the Internet in learning. Learning patterns are constantly …

A security and privacy approach for RFID-based wireless networks in ubiquitous computing

S Gopinathan, S Babu - Ubiquitous and Transparent Security, 2024 - taylorfrancis.com
A computing paradigm known as ubiquitous computing allows for computing to present
anywhere utilizing every device, anywhere, and in any manner. It covers mobile and …

[PDF][PDF] Predictors for Conversion to Open Appendectomy in Patients Undergoing Laparoscopic Appendectomy Based on Clinical Presentations on Ultrasonography …

V Srivastav, N Rai, K Mishra - World, 2020 - wjols.com
Background: Laparoscopic appendectomy (LA) may need to be converted to open
appendectomy (OA) if intraoperative complications or severity of the disease hinders with a …

Towards the 21st century: Solutions to the problems and pitfalls of mobile learning in education and training

P Sumitra, S Sabitha, M Sathiya, G Sathya… - Ubiquitous and … - taylorfrancis.com
In this current era, technology used in information and communication has realized an
impeccable potential in the area of training and education. Learners are being provided with …

Network lifetime and throughput analysis in wireless sensor networks using fuzzy logic

H Kumar, PK Singh - Recent Advances in Electrical & Electronic …, 2020 - ingentaconnect.com
Background: Currently, Wireless sensor networks are the most prominent area in research.
Energy consumption is one of the important challenges in wireless sensor networks …