Results 141 to 150 of about 47,897 (311)

Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment

open access: yesInternational Journal of Distributed Sensor Networks, 2019
In vehicular ad hoc networks, attackers can disguise as replicas of legitimate vehicles by cracking or colluding and then use the identity replicas in a malicious way.
Yan Xin, Xia Feng
doaj   +1 more source

Temporal Stretch‐Induced Nuclear Mechanosensing Coordinates Early Chromatin Accessibility and Genome Protection

open access: yesAdvanced Science, EarlyView.
Cyclic stretching of fibroblasts triggers coordinated nuclear mechanosensing events, including calcium ion release, perinuclear actin assembly, emerin translocation, and H3K9me3 loss, increasing chromatin accessibility for specific genes related to mechanotransduction and repair.
Hye‐Won Shim   +10 more
wiley   +1 more source

Engineered Multifunctional Hydrogel Delivering Novel CBX7 Inhibitor Modulates Cuproptosis Via Liquid–Liquid Phase Separation to Restore Cardiac Function in Aged Myocardial Infarction

open access: yesAdvanced Science, EarlyView.
An age‐adapted therapy pairs δ‐Amyrenone, a CBX7 inhibitor, with an alginate hydrogel (CSAδ) to rescue infarcted elderly hearts. CSAδ disrupts CBX7–ATP7A liquid–liquid phase separation, restores ATP7A trafficking and copper efflux, suppresses cuproptosis, supplies oxygen, scavenges ROS, promotes M2 polarization, supports angiogenesis, and enhances ...
Jun Liu   +11 more
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Performance Analysis for Priority-Based Broadcast in Vehicular Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Transportation safety is one of the most important applications of vehicular ad hoc networks which is based on IEEE 802.11p. When a vehicle is in an emergency situation, a safety-related message is transmitted to the neighboring vehicles and ...
Rinara Woo   +2 more
doaj   +1 more source

Inter-Vehicular Communications Using Wireless Ad Hoc Networks [PDF]

open access: green, 2009
Raúl Aquino-Santos   +5 more
openalex   +1 more source

Microglial Feimin Alleviates Cognitive Impairment in High‐Fat Diet‐Fed Mice

open access: yesAdvanced Science, EarlyView.
Microglial feimin deletion exacerbates lipotoxicity‐induced neuroinflammation and cognitive decline. In both in vitro and in vivo models, loss of feimin aggravated lipid droplet accumulation, IL‐1β/IL‐6 release, and neuronal injury through the PI3K–AKT–mTOR pathway, ultimately leading to severe neuronal apoptosis and cognitive impairment under high‐fat
Ran Gao   +12 more
wiley   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

Home - About - Disclaimer - Privacy