Search results for "Node"

showing 10 items of 1701 documents

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

2015

Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…

Vehicular ad hoc networksEngineeringVehicular ad hoc networkOverheadGeneral Computer Sciencebusiness.industryWireless ad hoc networkIntrusion detection systemNode (networking)Detection rateIntrusion detection system[SPI]Engineering Sciences [physics]Control and Systems EngineeringWirelessOverhead (computing)False positive rateElectrical and Electronic EngineeringDetection timebusinessCluster analysisComputer networkVulnerability (computing)Computers & Electrical Engineering
researchProduct

A VLSI for deskewing and fault tolerance in LVDS links

2005

The device presented at this work is a switch implemented in a 0.35 mum CMOS process for compensating the skew which affects parallel data signal transmissions and for providing fault tolerance in large scale scalable systems, for instance used in trigger farms for high energy physics experiments. The SWIFT chip (SWItch for Fault Tolerance) is part of a cluster built around commercially components which has been inspired by the LHCb experiment. The skew is extremely important because it directly affects the sample window available to the receiver logic and either forces to use quality and expensive cables in order to minimize its effects or reduces the maximum signal transmission range or d…

Very-large-scale integrationEngineeringCMOSbusiness.industryElectronic engineeringSkewFault toleranceNode (circuits)Full custombusinessChipSignal14th IEEE-NPSS Real Time Conference, 2005.
researchProduct

Vienādranga tīkla tiešraides pārraidīšanas platforma

2016

Šajā dokumentā tiks aprakstīts kvalifikācijas darbs, kura ietvaros būs izstrādāta platforma priekš tiešraides video pārraides izmantojot vienādranga tīklu. Izstrādājamā funkcionalitāte ietvēra PHP un NodeJS koda izstrādi. Tā atbalsta video tiešraides sākšanu, skatīšos un to pārraidi citiem skatītājiem. Kā arī skatītāju saraksti savā starpā un informācija par iepriekšējām tiešraidēm.

Vienādranga tīklsDatorzinātneNodeJSPHPWebRTC
researchProduct

Expression and cellular localization of the Nef protein from human immunodeficiency virus-1 in stably transfected B-cells.

1992

Nef protein, encoded by the regulatory nef gene of human immunodeficiency virus type 1 (HIV-1), was expressed in the B-cell line Raji. The cells were stably transfected with plasmids containing the nef transcriptional cassette. They expressed Nef with an Mr of 27,000; the yield could be augmented by incubation with the tumor promoter 12-O-tetradecanoylphorbol-13-acetate. The intracellular localization of Nef was analyzed applying immunofluorescence microscopy using a confocal laser scanning microscope. The antigen was stained with a monoclonal antibody directed against the N-terminal part of Nef. The experiments revealed that in non-dividing cells Nef is present both in the cytoplasm and th…

Viral proteinvirusesGenetic VectorsFluorescent Antibody TechniqueBiologymedicine.disease_causeTransfectionVirusGene Products nefGene productAntigenVirologyGene expressionmedicineTumor Cells CulturedHumansnef Gene Products Human Immunodeficiency VirusCellular localizationB-LymphocytesMicroscopyvirus diseasesGeneral MedicineTransfectionVirologyMolecular biologyCytoplasmHIV-1Tetradecanoylphorbol AcetateArchives of virology
researchProduct

Effect and optimization of burst assembly algorithms for video traffic transmissions over OBS networks

2008

Optical burst switching (OBS) has been proposed to be a technology for implementing the next generation optical Internet. In this architecture, burst assembly algorithms have an important influence in the traffic pattern that characterizes this sort of optical networks. On the other hand, traffic coming from new applications (such as video on demand, Voice over IP, online gaming or Grid services) that have real time and bandwidth constraints has been experimented a rapid increment. Consequently, we consider important to evaluate the performance of the real time traffic over OBS networks. In this paper, we evaluate the video transmissions performance (MPEG4/RTP/UDP) over OBS networks, for bo…

Voice over IPbusiness.industryComputer scienceEdge nodeReal-time computing020206 networking & telecommunications02 engineering and technologyGridOptical burst switchingAirfield traffic pattern020210 optoelectronics & photonics0202 electrical engineering electronic engineering information engineeringBandwidth (computing)sortThe InternetbusinessAlgorithmComputer network
researchProduct

The waiting time for prostate cancer treatment in Italy: analysis from the PROS-IT CNR Study.

2022

Background Prostate cancer (PCa) is the second most common neoplasm in male patients. To date, there's no certain indication about the maximum waiting time (WT) acceptable for treatment beginning and the impact on oncological and functional outcomes has not been well established. Methods Data from the National Research Council PCa monitoring multicenter project in Italy (Pros-IT CNR) were prospectively collected and analyzed. WT was defined as the time from the bioptical diagnosis of PCa to the first treatment received. Patients were divided in two groups, using a time frame of 90 days. Quality of life was measured through the Italian version of the University of California Los Angeles-Pros…

Waiting timeMalemedicine.medical_specialtyWaiting ListsUrologyLymph node metastasisAndrogen deprivation therapySettore MED/06Prostate cancerPercutaneous Coronary Interventionprostate cancer radical prostatectomy screeningQuality of lifeSettore MED/36Internal medicinemedicineHumansWaiting lists; Prostatic neoplasms; Prostatectomy; Radiotherapy; Androgens; Humans; Male; Prostate; Quality of Life; Waiting Lists; Percutaneous Coronary Intervention; Prostatic NeoplasmsProstatectomySurgical approachRadiotherapybusiness.industryscreeningProstateCancerProstatic NeoplasmsWaiting timeprostate cancermedicine.diseaseradical prostatectomyNephrologyAndrogensQuality of LifeT-stagePositive Surgical Marginbusiness
researchProduct

A New Neighbour Selection Strategy for Group-Based Wireless Sensor Networks

2008

In any type of networks a neighbour selection method is needed to form the topology of the network and to know which node the information has to be sent to reach a destination. Nowadays, several selection strategies exist that are based on different aspects and mainly designed to work in common networks. In this paper we will show our study about those different methods and, then we show the development of a suitable neighbour selection strategy for group-based wireless sensor networks (WSN) that is based on a capacity parameter defined by us and the new neighbour distance. We also present the proposal architecture for WSNs and the protocol when a new node joins a group and has to select it…

Wi-Fi arrayWireless networkComputer sciencebusiness.industryDistributed computingNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSJoinsKey distribution in wireless sensor networksMobile wireless sensor networkbusinessWireless sensor networkSelection (genetic algorithm)Computer networkFourth International Conference on Networking and Services (icns 2008)
researchProduct

WIDAR: Bistatic WI-fi Detection And Ranging for off-the-shelf devices

2013

The huge spread of wireless networks and the success of location-aware applications require novel indoor po- sitioning mechanisms based on existing technologies such as IEEE 802.11. Taking inspiration from the RADAR, we propose WIDAR: a bistatic WI-fi Detection And Ranging system for off- the-shelf devices. WIDAR implementation is based on the USRP2 platform and is able to locate 802.11 stations while they operate in existing legacy networks. No substitution or repositioning of the Access Points is necessary. WIDAR works passively and does not expect any dedicated action from the target WiFi node. No airtime is wasted and the target cannot even detect that it is being ranged. Such features …

Wi-Fi arrayranging positioning passive radar wireless wifi 802.11Settore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryWireless networkNode (networking)Real-time computingRanginglaw.inventionBistatic radarlawOff the shelfRadarSurveillance and monitoringbusinessComputer network2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
researchProduct

Simultaneous ranging and self-positioning in unsynchronized wireless acoustic sensor networks

2016

Automatic ranging and self-positioning is a very desirable property in wireless acoustic sensor networks, where nodes have at least one microphone and one loudspeaker. However, due to environmental noise, interference, and multipath effects, audio-based ranging is a challenging task. This paper presents a fast ranging and positioning strategy that makes use of the correlation properties of pseudonoise sequences for estimating simultaneously relative time-of-arrivals from multiple acoustic nodes. To this end, a proper test signal design adapted to the acoustic node transducers is proposed. In addition, a novel self-interference reduction method and a peak matching algorithm are introduced, a…

Wireless acoustic sensor networksMicrophoneComputer scienceReal-time computing02 engineering and technologyInterference (wave propagation)SynchronizationlocalizationTECNOLOGIA ELECTRONICA0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringwireless acoustic sensor networksbusiness.industryRangingNode (networking)020208 electrical & electronic engineeringpseudo-noise seequences020206 networking & telecommunicationsRangingTransducerComputer Science::SoundEmbedded systemLocalizationSignal ProcessingLoudspeakerbusinessPseudo-noise seequencesMultipath propagation
researchProduct

Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks

2013

Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …

Wireless mesh networkHidden node problembusiness.industryComputer scienceWireless networkSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOrder One Network ProtocolShared meshKey distribution in wireless sensor networkswireless mesh networks synchronization pseudo-TDMA random accessbusinessComputer networkIEEE 802.11sWireless distribution system
researchProduct