Results 41 to 50 of about 335,875 (298)

Feasibility and Safety of High‐Dose Proton Re‐Irradiation in Recurrent Pediatric Central Nervous System Tumors: A Single‐Institution Retrospective Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Pediatric central nervous system (CNS) tumors often recur despite multimodality therapy. Although re‐irradiation (re‐RT) has historically been limited by concerns for severe late toxicities, modern techniques have renewed interest in this approach. Proton therapy provides dosimetric advantages that may enable curative re‐treatment with
Jin‐Ho Song   +15 more
wiley   +1 more source

A UCB-based dynamic CoAP mode selection algorithm in distribution IoT

open access: yesAlexandria Engineering Journal, 2022
Lightweight constrained application protocol (CoAP) has emerged as a common communication protocol for resource-constrained equipment in distribution internet of things (IoT).
Shidong Zhang   +4 more
doaj   +1 more source

Comparative study among constrained application protocol extensible messaging and presence protocol of IoT

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2022
<span>Many specialists are now looking for ways for commercial development and the introduction of technology and internet applications, especially since many homes in smart and developed cities need a great degree of fitness and electrical control.
Abdal Motalib Alshrif   +2 more
openaire   +1 more source

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

Privacy protection key distribution protocol for edge computing

open access: yes网络与信息安全学报, 2021
Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve ...
Jian SHEN   +3 more
doaj   +3 more sources

Win CoAP: A Window-Based Congestion Control Approach for Burst Traffic in IoT Networks

open access: yesIEEE Access
Constrained Application Protocol (CoAP) is a widely used communication protocol in Internet of Things (IoT) networks. Congestion is a major concern in IoT networks because it affects the performance of applications and network reliability.
Archana K. Rajan, Masaki Bandai
doaj   +1 more source

Structural instability impairs function of the UDP‐xylose synthase 1 Ile181Asn variant associated with short‐stature genetic syndrome in humans

open access: yesFEBS Letters, EarlyView.
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li   +2 more
wiley   +1 more source

An Edge-Fog Secure Self-Authenticable Data Transfer Protocol

open access: yesSensors, 2019
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise.
Algimantas Venčkauskas   +5 more
doaj   +1 more source

CoAP and Its Performance Evaluation

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2020
ConstrainedApplication Protocol (CoAP) is one of the lightest IoT connectivity protocol.It has been developed for IoT devices that has constrained resources such asmemory, processing power, battery etc. CoAP protocol is built on RESTarchitecture.
Ünal Çavuşoğlu   +3 more
doaj   +1 more source

A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration [PDF]

open access: yes, 2019
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Carpio, Francisco   +3 more
core   +4 more sources

Home - About - Disclaimer - Privacy