Results 31 to 40 of about 419,821 (262)
Test bed for Network Protocols Optimization
This paper describes a test platform for verifying the functionality of network protocols as well as optimizing their parameters. The test bed is made by using combined OPNET simulator and MATLAB development environment. This test platform connects OPNET
A. Ceco, S. Mrdovic
doaj +1 more source
Network Extractor Protocols [PDF]
We design efficient protocols for processors to extract private randomness over a network with Byzantine faults, when each processor has access to an independent weakly-random n-bit source of sufficient min-entropy.We give several such network extractor protocols in both the information theoretic and computational settings.For a computationally ...
Yael Tauman Kalai +3 more
openaire +1 more source
ABSTRACT Introduction Cognitive impairment and exercise intolerance are common in dialysis patients. Cerebral perfusion and oxygenation play a major role in both cognitive function and exercise execution; HD session per se aggravates cerebral ischemia in this population. This study aimed to compare cerebral oxygenation and perfusion at rest and in mild
Marieta P. Theodorakopoulou +10 more
wiley +1 more source
Network-Layer Accountability Protocols: A Survey
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj +1 more source
Data security in smart devices: Advancement, constraints and future recommendations
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high‐tech devices has ...
Zhang Wenhua +6 more
doaj +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
In the network environment of power systems, payload generation is used to construct data packets, which are used to obtain data for the security management of network assets.
Hao Zhang +6 more
doaj +1 more source
The role and implications of mammalian cellular circadian entrainment
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley +1 more source
New opportunities for studying digital information transmission technologies using Cisco equipment [PDF]
The article describes a methodology for studying network technologies using Cisco equipment to create a model of a digital three-level information transmission network with further analysis of the network state and network traffic research.
Prosviryakova L. V. +2 more
doaj +1 more source
Peptide‐based ligand antagonists block a Vibrio cholerae adhesin
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang +9 more
wiley +1 more source

