نتایج جستجو برای: arp plus noise process
تعداد نتایج: 1584340 فیلتر نتایج به سال:
We consider LTE and WiFi networks in order to model both PHY and MAC layers. Our physical layer abstraction consists a mapping between user’s SINR and their corresponding rate. On the other hand, we will propose a proper queue model to represent the schedulers of each radio access technique (RAT), at the MAC layer.
BACKGROUND AND OBJECTIVE Radical parametrectomy (RP), performed either abdominally (ARP) or laparoscopically (LRP), is a viable alternative to radiotherapy in treating invasive cervical cancer, vaginal apex cancer, and endometrial cancer that is more advanced than initially suspected after hysterectomy. We carried out a comparative study on intra- and postoperative parameters between the two pe...
Argimycins P are a recently identified family of polyketide alkaloids encoded by the cryptic gene cluster arp of Streptomyces argillaceus. These compounds contain either a piperideine ring, or a piperidine ring which may be fused to a five membered ring, and a polyene side chain, which is bound in some cases to an N-acetylcysteine moiety. The arp cluster consists of 11 genes coding for structur...
After the ARP and IP were drafted, a subtle weakness in the Address Resolution Protocol was discovered. Unlike TCP, ARP relies on raw sockets and like UDP; ARP provides no means to establish the authenticity of the source of incoming packets. Although this problem can be resolved in case of UDP packets by considering alternate approaches such as DNS replies being sent over TCP rather than UDP u...
ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this p...
Most attacks are launched inside the companies by the employees of the same company. These kinds of attacks are generally against layer-2, not against layer-3 or IP. These attacks abuse the switch operation at layer-2. One of the attacks of this kind is Address Resolution Protocol (ARP) Spoofing (sometimes it is called ARP poisoning). This attack is classified as the “man in the middle” (MITM) ...
The present case is of a 14-year-old female with trichotillomania (TTM) that was treated with a low dose of aripiprazole (ARP) 1.5 mg/day. To our knowledge, this is the first published report to show an improvement of pubertal TTM using an ultra-low dose of ARP. In this case, a 50-mg fluvoxamine monotherapy for 2 years and a subsequent 4-month comprehensive cognitive behavioral therapy (CBT) mo...
The primary objective of Cyber Security is to protect data in transit. If a network is vulnerable at layer two, the good fortune opens wide up for an attacker. With the easy availability of refined offensive tools that can exploit these vulnerabilities to create havoc in networks, there is a dire need of mitigative measures that can cope up with increasing threats. ARP Protocol violation is amo...
Using published luminosity and molecular gas profiles of the late-stage mergers NGC 3921, NGC 7252 and Arp 220, we examine the expected luminosity profiles of the evolved merger remnants, especially in light of the massive CO complexes that are observed in their nuclei. For NGC 3921 and NGC 7252 we predict that the resulting luminosity profiles will be characterized by an r law. In view of prev...
Syntheses of heteroleptic 1,8-bis(phosphino)naphthalenes and 5,6-bis(phosphino)acenaphthenes were attempted using several synthetic strategies. Reaction of aryllithium with triphenylphosphite gave ArP(OPh)(2) (Ar = substituted naphthalene or acenaphthene), which was transformed into ArP(CF(3))(2), using a nucleophilic trifluoromethylation reaction with Me(3)SiCF(3)/CsF. The importance of the co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید