Results 41 to 50 of about 6,259,413 (319)

Protocol generation for communication channels [PDF]

open access: yesProceedings of the 31st annual conference on Design automation conference - DAC '94, 1994
System-level partitioning groups processes and variables in the system specification into modules representing chips and memories. Communication between the modules is represented by abstract communication channels, which are merged and implemented as a bus to minimize interconnect. Given a set of channels, bus generation synthesizes the bus structure,
Sanjiv Narayan, Daniel Gajski
openaire   +2 more sources

Analysis of breast region segmentation in thermal images using U-Net deep neural network variants

open access: yesFrontiers in Bioinformatics
IntroductionBreast cancer detection using thermal imaging relies on accurate segmentation of the breast region from adjacent body areas. Reliable segmentation is essential to improve the effectiveness of computer-aided diagnosis systems.MethodsThis study
Rafhanah Shazwani Rosli   +3 more
doaj   +1 more source

A Survey on Mobility Support in Wireless Body Area Networks

open access: yesSensors, 2017
Wireless Body Area Networks (WBANs) have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology.
Beom-Su Kim, Kyong Hoon Kim, Ki-Il Kim
doaj   +1 more source

Triggered qutrits for Quantum Communication protocols

open access: yes, 2004
A general protocol in Quantum Information and Communication relies in the ability of producing, transmitting and reconstructing, in general, qunits. In this letter we show for the first time the experimental implementation of these three basic steps on a
A. Ambainis   +30 more
core   +1 more source

Perceptual considerations for quality of service management: An integrated architecture [PDF]

open access: yes, 2001
The official published version can be obtained from the link below - copyright @ 2001 SpringerIn this paper, we suggest an integrated architecture that makes use of the objective-technical information provided by the designer and the ...
Ghinea, G, Magoulas, G
core   +1 more source

Practical applications of probabilistic model checking to communication protocols [PDF]

open access: yes, 2012
Probabilistic model checking is a formal verification technique for the analysis of systems that exhibit stochastic behaviour. It has been successfully employed in an extremely wide array of application domains including, for example, communication and ...
Alur   +32 more
core   +2 more sources

Towards a greater reliability of driver/device communication around the system life cycle through a contract-based protocol specification

open access: yesIET Cyber-Physical Systems, 2018
Vehicle computers, Internet of Things and cyber-physical systems are all examples of electronic devices in which embedded systems require greater flexibility to process different types of applications and communication protocols.
Rafael Melo Macieira, Edna Barros
doaj   +1 more source

A family of quantum protocols

open access: yes, 2004
We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol).
Devetak, I., Harrow, A. W., Winter, A.
core   +1 more source

Real-time thermography for breast cancer detection with deep learning

open access: yesDiscover Artificial Intelligence
In this study, we propose a framework that enhances breast cancer classification accuracy by preserving spatial features and leveraging in situ cooling support.
Mohammed Abdulla Salim Al Husaini   +2 more
doaj   +1 more source

Review of Design Elements within Power Infrastructure Cyber–Physical Test Beds as Threat Analysis Environments

open access: yesEnergies, 2021
Cyber–physical systems (CPSs) are an integral part of modern society; thus, enhancing these systems’ reliability and resilience is paramount. Cyber–physical testbeds (CPTs) are a safe way to test and explore the interplay between the cyber and physical ...
Bjorn Vaagensmith   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy