نتایج جستجو برای: node capture

تعداد نتایج: 287175  

2010
Giacomo de Meulenaer François-Xavier Standaert

Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of events that arise during the attack such as the removal of a node for instance. However, certain attacks, such as side-channel attacks, might be furtive and defeat this type of defense. This work clarifies this question by...

Journal: :SIAM Journal of Applied Mathematics 2011
Fabrice Guillemin Charles Knessl Johan van Leeuwaarden

Wireless networks equipped with CSMA are scheduled in a fully distributed manner. A disadvantage of such distributed control in multihop networks is the hidden node problem, which causes the effect of stealing, in which a downstream node steals the channel from an upstream node with probability p. Aziz, Starobinski, and Thiran [IEEE/ACM Trans. Networking, to appear] have recently shown that the...

Journal: :IEEE Transactions on Electron Devices 2021

The dynamic random access memory (DRAM) disturb known as rowhammer (RH) has come to dominate the insecurity of computing systems worldwide. Several studies have concentrated on electron injection from a switching cell select transistor and capture by nearby storage node junctions being main mechanism for effect. This article first time looks in-depth at RH point view both capture, capacitive cr...

Ali Jangjoo Gholamali Shabani Mohammad Naser Forghani Ramin Sadeghi, Seyed Rasoul Zakavi, Vahid Reza Dabbagh Kakhki,

  Introduction: There is a consensus in the literature that sentinel lymph node biopsy is the standard procedure for axillary staging in early stage (I and II) breast cancer patients. Usually during lymphoscintigraphy, the location of the sentinel lymph node is marked on the skin by an indelible ink. In this study we evaluated this issue in our patients. Methods: 40 ...

Journal: :iranian journal of radiation research 0
m. najafi surgery department, cancer institute, tehran university of medical science, tehran, iran h.a. nedaie radiotherapy oncology department, cancer institute, tehran university of medical sciences, tehran, iran a. lahooti radiotherapy oncology department, cancer institute, tehran university of medical sciences, tehran, iran r. omranipour surgery department, cancer institute, tehran university of medical science, tehran, iran n. nafissi khatam cancer center, khatam-ol-anbia hospital, vali asr ave, tehran, iran m.e. akbari department of surgery, shohada tajrish hospital, tajrish, qhods sq., tehran, iran

background: sentinel node biopsy (slnb) is the standard of care for breast cancer treatment and it is getting wide acceptance in iran. the radiation safety of the procedure has been investigated under controlled conditions, but the standard dose of radiotracer and techniques are not always observed in the community setting. the aim of this study was to assess the magnitude of the absorbed doses...

Journal: :iranian journal of pathology 2012
shokouh aghipour zahir kiyanoosh sedaghat saeed kargar

endometrial adenocarcinoma is uncommon in fewer than 40-year-old people. the first common sign and symptoms are abnormal vaginal bleeding and discharge. metastasis is occurred in the late stage. here we present a 31-year-old nullipar woman who was admitted to surgical ward with enlarged right inguinal lymphnode from one month ago. she had no history of previous malignancy, infectious condition,...

2013
Naresh Kumar

Wireless sensor networks are emerging as one of the dominant technologies in the communication and computing world. These are known to be composed of hundreds, and potentially thousands of connected sensor nodes with several distinguished characteristics, used for gathering the essential data from unattended or hostile environments. Being deployed in the areas such as armed forces for surveilla...

Journal: :IEICE Transactions 2011
Eitaro Kohno Tomoyuki Ohta Yoshiaki Kakuda Masaki Aida

A Wireless Sensor Network has sensor nodes which have limited computational power and memory size. Due to the nature of the network, the data is vulnerable to attacks. Thus, maintaining confidentiality is an important issue. To compensate for this problem, there are many countermeasures which utilize common or public key cryptosystems that have been proposed. However, these methods have problem...

Journal: :international journal of environmental research 0
a. ataei department of energy engineering, graduate school of the environment and energy, science and research branch, islamic azad university, tehran, iran a. iranmanesh department of energy engineering, graduate school of the environment and energy, science and research branch, islamic azad university, tehran, iran z. rashidi department of energy engineering, graduate school of the environment and energy, science and research branch, islamic azad university, tehran, iran

this study investigated different concepts for natural-gas-fired power plants with the co2capture, and compared them based on the net plant efficiency and emission of co2. the cycles were based ona six oxy-fuel, one post-combustion and two pre-combustion capture concept. this paper presented theresults of an environmental evaluation performed by the application of the life cycle analysis (lca) ...

Journal: :iranian journal of radiation research 0
h. ghiasi medical physics department, medical school, tabriz university of medical sciences, tabriz, iran a. mesbahi radiation oncology department, imam hospital, daneshgah street, tabriz, iran

background: the characteristics of secondary neutrons in a high energy radiation therapy room were studied using the mcnpx monte carlo (mc) code. materials and methods: two mc models including a model with full description of head components and a simplified model used in previous studies were implemented for mc simulations. results: results showed 4-53% difference between full and with the sim...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید