نتایج جستجو برای: gsm radiation
تعداد نتایج: 242554 فیلتر نتایج به سال:
In graph analytics, the identification of influential nodes in real-world networks plays a crucial role understanding network dynamics and enabling various applications. However, traditional centrality metrics often fall short capturing interplay between local global information. To address this limitation, Global Structure Model (GSM) its improved version (IGSM) have been proposed. Nonetheless...
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). The mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and encryption keys of greater strength than the indiv...
Schema matching is a basic problem nowadays in many application areas, such as data integration, data warehouse and e-business. In this paper, we propose a generic schema matching method called GSM (Generic Schema Matching) and its optimizing approaches. GSM provides an extensible library of match algorithms to support multi-strategy matching approach. It also uses a mapping knowledge base to l...
-This paper evaluate the development of low cost security system in the area where there is need of continuous monitoring using PIR (pyroelectric infrared) sensor. A special type of human sensor PIR is used to detect the human being around 20 feet distance. This sensor uses the concept of Black Body Radiation. If anyone tries to cross the area means the sensor detects and it sends a signal to t...
The data on biologic effects of nonthermal microwaves (MWs) from mobile telephones are diverse, and these effects are presently ignored by safety standards of the International Commission for Non-Ionizing Radiation Protection (ICNIRP). In the present study, we investigated effects of MWs of Global System for Mobile Communication (GSM) at different carrier frequencies on human lymphocytes from h...
Recently, Ahmadian and Salimi [1] presented and analyzed three different attacks that can be performed in UMTS-GSM interworking networks: (i) a real-time eavesdropping attack, (ii) an offline eavesdropping attack, and (iii) an impersonation attack. In this letter we question the feasibility of these attacks. In particular, we pinpoint and analyze that these attacks are based on some erroneous a...
In GSM system, speech is coded in frames. Here the redundancy is characterized mainly by the statistical correlation among certain temporally neighboring coefficients or bits. In our investigations the redundancy among bits is first utilized to realize a source-controlled channel decoding [2], so that the bit error rate can be further reduced. Then based on the redundancy among coefficients an ...
BACKGROUND AND PURPOSE Our hypothesis was that the carotid plaques associated with retinal and cerebrovascular symptomatology and asymptomatic presentation may be differ from each other. The aim of this study was to identify the sonographic and histopathologic characteristics of plaques that corresponded to these three clinical manifestations. METHODS The echo process involved duplex preopera...
BACKGROUND AND OBJECTIVE Bisphenol A (BPA) levels have previously been associated with coronary heart disease (CHD). Since CHD is an atherosclerotic disease, we investigated if circulating levels of BPA and phthalate metabolites are related to atherosclerosis in a cross-sectional study. METHODS In the population-based Prospective Investigation of the Vasculature in Uppsala Seniors (PIVUS) stu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید