نتایج جستجو برای: tesla protocol
تعداد نتایج: 257266 فیلتر نتایج به سال:
This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...
This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...
Background Cardiac magnetic resonance imaging (CMR) including adenosine perfusion and late gadolinium enhancement (LGE) at 1.5 Tesla (T) has been established for noninvasive detection of relevant coronary artery disease (CAD). However, little is known about the potential advantages of 3.0-T to detect CAD. The aim of our prospective study was to compare a compiled clinical routine CMR protocol p...
The aim of this study was to successfully establish an orthotopic murine model using two different human pancreatic adenocarcinoma cell lines and to propose a 3.0 tesla MRI protocol for noninvasive characterization of this model. SW1990 and MIAPaca-2 tumor cells were injected into the pancreas of BALB/C nu/nu mice. Tumor growth rate and morphological information were assessed by 3.0 tesla MRI (...
Introduction Temporomandibular joint (TMJ) dysfunction is a cause of headache, facial pain and referred otalgia, which can be quite debilitating to patients. MRI has been applied in limited circumstances to define contours of the articular disc, and to evaluate disc motion during translation of the condyle with opening and closing of the mouth. Broad implementation of an effective protocol has ...
Methods We reviewed the data of all patients who were referred for stress CMR (1.5 Tesla) from February 2006 to February 2010 to the Centre de Diagnostic Radiologique de Carouge, an outpatient imaging center. Standard protocol consisted of: 1) assessment of myocardial function at rest; 2) pharmacological stress induced either by dobutamine (protocol of 10, 20, 30, 40 μg/kg/min during 3 minutes ...
In many wireless sensor network applications, the data collection sink (base station) needs to find the aggregated statistics of the network. Readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. However, the previous optimally secure in-network aggregation protocols against multiple corrupted nodes require two round-trip communications between each n...
SUMMARY Wireless Sensor Networks (WSNs) rely on in-network ag-gregation for efficiency, that is, readings from sensor nodes are aggregated at intermediate nodes to reduce the communication cost. However, the previous optimally secure in-network aggregation protocols against multiple corrupted nodes require two round-trip communications between each node and the base station, including the resul...
To fulfill two integral aims of abating cellular traffic and enhancing efficiency network, D2D is considered as a novel channel communication. This form communication has introduced for 4th enacts significant role in the 5th generation. Four scenarios defined references, includes direct relaying both with without infrastructure. One major challenges addressing protocols contributes to fact that...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید