Results 21 to 30 of about 6,332,366 (301)

Intelligent Packet Priority Module for a Network of Unmanned Aerial Vehicles Using Manhattan Long Short-Term Memory

open access: yesDrones
Unmanned aerial vehicles (UAVs) are becoming more common in wireless communication networks. Using UAVs can lead to network problems. An issue arises when the UAVs function in a network-access-limited environment with nodes causing interference.
Dino Budi Prakoso   +4 more
doaj   +1 more source

Model for speech signal quality estimation in packet network of electricity supply industry [PDF]

open access: yesSerbian Journal of Electrical Engineering, 2019
In this paper we present the dilemma dealing with the choice of speech segment duration and the calculation of speech signal quality in the packet telephone network of Electricity supply industry (ESI).
Lebl Aleksandar   +3 more
doaj   +1 more source

Sistem Komunikasi Modul Sensor Jamak Berbasiskan Mikrokontroler Menggunakan Serial Rs-485 Mode Multi Processor Communication (Mpc)

open access: yesLontar Komputer, 2016
Multi-sensor communication system uses RS-485 standard communication connecting each microcontroller-based data processing unit to form BUS topology network. The advantages of this  communication system  are:  connectivity  (easy  to  connecting  devices
Suar wibawa   +2 more
doaj   +1 more source

Broadcast Retransmission Algorithm Based on Hamming Weight Network Coding [PDF]

open access: yesJisuanji gongcheng, 2016
The channel of wireless network is easily affected by the environment.The high packet loss rate is caused by the moving receiving node.In order to solve this problem,this paper proposes a retransmission algorithm combining Hamming weight with broadcast ...
XU Guangxian,XU Shanqiang,XU Chunyan,JIN Yubo,WANG Jingfu
doaj   +1 more source

Anomalous Network Packet Detection Using Data Stream Mining

open access: yesJ. Information Security, 2011
In recent years, significant research has been devoted to the development of Intrusion Detection Systems (IDS) able to detect anomalous computer network traffic indicative of malicious activity.
Zachary Miller   +2 more
semanticscholar   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Reciprocal control of viral infection and phosphoinositide dynamics

open access: yesFEBS Letters, EarlyView.
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley   +1 more source

The role of fibroblast growth factors in cell and cancer metabolism

open access: yesFEBS Letters, EarlyView.
Fibroblast growth factor (FGF) signaling regulates crucial signaling cascades that promote cell proliferation, survival, and metabolism. Therefore, FGFs and their receptors are often dysregulated in human diseases, including cancer, to sustain proliferation and rewire metabolism.
Jessica Price, Chiara Francavilla
wiley   +1 more source

An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots

open access: yesFEBS Letters, EarlyView.
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino   +7 more
wiley   +1 more source

ACTIVE NETWORK SECURITY BASED RSA ALGORITHM

open access: yesJournal of Engineering, 2009
The difficulty of building a secure network is due to the changing nature of the enterprise coupled with the increasing sophistication of the hacker threat, both from inside and outside of the network. Active networks enable individual user or groups of
Ahmed Freidoon Fadhil   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy