Results 31 to 40 of about 419,821 (262)

Test bed for Network Protocols Optimization

open access: yesTelfor Journal, 2019
This paper describes a test platform for verifying the functionality of network protocols as well as optimizing their parameters. The test bed is made by using combined OPNET simulator and MATLAB development environment. This test platform connects OPNET
A. Ceco, S. Mrdovic
doaj   +1 more source

Network Extractor Protocols [PDF]

open access: yes2008 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
We design efficient protocols for processors to extract private randomness over a network with Byzantine faults, when each processor has access to an independent weakly-random n-bit source of sufficient min-entropy.We give several such network extractor protocols in both the information theoretic and computational settings.For a computationally ...
Yael Tauman Kalai   +3 more
openaire   +1 more source

A Comparative Study of Cerebral Oxygenation During Exercise in Hemodialysis and Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Cognitive impairment and exercise intolerance are common in dialysis patients. Cerebral perfusion and oxygenation play a major role in both cognitive function and exercise execution; HD session per se aggravates cerebral ischemia in this population. This study aimed to compare cerebral oxygenation and perfusion at rest and in mild
Marieta P. Theodorakopoulou   +10 more
wiley   +1 more source

Network-Layer Accountability Protocols: A Survey

open access: yesIEEE Access, 2018
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj   +1 more source

Data security in smart devices: Advancement, constraints and future recommendations

open access: yesIET Networks, 2023
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high‐tech devices has ...
Zhang Wenhua   +6 more
doaj   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Generating Payloads of Power Monitoring Systems Compliant with Power Network Protocols Using Generative Adversarial Networks

open access: yesEnergies
In the network environment of power systems, payload generation is used to construct data packets, which are used to obtain data for the security management of network assets.
Hao Zhang   +6 more
doaj   +1 more source

The role and implications of mammalian cellular circadian entrainment

open access: yesFEBS Letters, EarlyView.
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley   +1 more source

New opportunities for studying digital information transmission technologies using Cisco equipment [PDF]

open access: yesE3S Web of Conferences
The article describes a methodology for studying network technologies using Cisco equipment to create a model of a digital three-level information transmission network with further analysis of the network state and network traffic research.
Prosviryakova L. V.   +2 more
doaj   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy