نتایج جستجو برای: node capture

تعداد نتایج: 287175  

Journal: :the modares journal of electrical engineering 2004
zahra atlasbaf kayvan forooraghi

in this paper two nodes to model isotropic and anisotropic media in transmission line matrix method (tlm) are presented. by using these two nodes, the permeability and permittivity of an anisotropic media can be modeled simultaneously. another application of these nodes is in modeling media with permittivity and permeability less than one. in the conventional 2 dimensional tlm, the stubs repres...

Journal: :journal of advances in computer engineering and technology 0
mehran pourmohammad abdollahi university of tabriz javad musevi niya university of tabriz payman mahmoudi biroun university of tabriz

designing wireless sensor networks should meet appropriate parameters such as quality of service (qos) defined by different users. the variable physical conditions of the environment, processing and transmission power limitations and limited communication capabilities are the most important obstacles that influence qos parameters such as throughput, delay, reliability and network lifetime. the ...

حسن زاده, جعفر, رجایی فرد, عبدالرضا, روشنی, دائم, قادری, ابراهیم, ناصحی, مهشید,

Recently, capture-recapture studies have been used and researchers tend to use these studies in the health field. Therefore, we discussed the basic concepts of these studies. First, we described capture-recapture studies. Then, the important assumptions and calculations were presented according to the close population assumption. Statistical formulas were presented for two-capture methods and d...

Journal: :J. Inform. and Commun. Convergence Engineering 2009
DongGook Park

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/ SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environmen...

Journal: :Circulation research 2015
Vasanth Vedantham Giselle Galang Melissa Evangelista Rahul C Deo Deepak Srivastava

RATIONALE Treatment of sinus node disease with regenerative or cell-based therapies will require a detailed understanding of gene regulatory networks in cardiac pacemaker cells (PCs). OBJECTIVE To characterize the transcriptome of PCs using RNA sequencing and to identify transcriptional networks responsible for PC gene expression. METHODS AND RESULTS We used laser capture microdissection on...

2010
Han Park JooSeok Song

We propose an enhanced key management scheme based on Key Infection, which is lightweight scheme for tiny sensors. The basic scheme, Key Infection, is perfectly secure against node capture and eavesdropping if initial communications after node deployment is secure. If, however, an attacker can eavesdrop on the initial communications, they can take the session key. We use common neighbors for ea...

2015
MEGHA SHARMA

Node replication attack is one of the most dreadful security attack exist in Wireless Sensor Networks, as a result researchers are paying attention towards developing security schemes against node capture attack. This Survey provides deep insights of Wireless Sensor Networks and security challenges. Also this paper includes review of various vulnerabilities and layer-wise classification of secu...

2015
Dongxiao He Weixiong Zhang

Identifying communities in complex networks is an effective means for analyzing complex systems, with applications in diverse areas such as social science, engineering, biology and medicine. Finding communities of nodes and finding communities of links are two popular schemes for network analysis. These schemes, however, have inherent drawbacks and are inadequate to capture complex organization...

2009
Hani Alzaid DongGook Park Juan Manuel González Nieto Colin Boyd Ernest Foo

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment...

Journal: :IJDSN 2013
Gowun Jeong Yongho Seo Hyun Seung Yang

Key management in a large portion of ubiquitous sensor networks has been a challenge due to the limited capabilities of their wireless communicating and battery-powered sensors. Moreover, an attacker physically capturing even a few nodes hampers the entire network security by impersonating nodes to inject false data in an undetected manner. To efficiently protect from such impersonating by node...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید