نتایج جستجو برای: node capture
تعداد نتایج: 287175 فیلتر نتایج به سال:
We evaluated the effects of slow-rate atrial pacing on impulse formation of the sinus node in 13 isolated rabbit right atria using the microelectrode technique. After the spread of activation was mapped to determine true sinoatrial conduction time (SACT) (38 ± 16 msec [± SD]), the atrium was paced for eight beats at constant intervals slightly shorter than spontaneous cycle length in steps of 1...
the notion of strong arcs in a fuzzy graph was introduced bybhutani and rosenfeld in [1] and fuzzy end nodes in the subsequent paper[2] using the concept of strong arcs. in mordeson and yao [7], the notion of“degrees” for concepts fuzzified from graph theory were defined and studied.in this note, we discuss degrees for fuzzy end nodes and study further someproperties of fuzzy end nodes and fuzz...
We describe the design of a system of compact, wireless sensor modules meant to capture expressive motion when worn at the wrists and ankles of a dancer. The sensors form a high-speed RF network geared toward real-time data acquisition from multiple devices simultaneously, enabling a small dance ensemble to become a collective interface for music control. Each sensor node includes a 6-axis iner...
This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is devised for dealing with sensory data aggregated by groups of collocated sensors. We model the network for secure routing with 3-tier sensor network composing three types of nodes: Base station, group dominator and ordinary sensor nodes. It is shown that more than 85% network connectivity c...
Many applications of wireless sensor network (WSN) require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Traditional asymmetric key cryptosystems are infeasible in WSNs due to the extremely low capacity and constrained resou...
Or traceback, thus making the detection of P2P bots is a real challenge. Fected machine by correlating bots behavioural attributes. Peacomm Storm P2P bot is. Stegginkrp1p2pdetect conceptpaper.pdf?id2007-2008. And focus on CC channel detection for P2P botnets that use multiple protocols randomly chosen for CC. We first consider a clustering based node behavior profiling approach to capture the n...
lymph node dissection is of prime importance for accurate staging of colorectal carcinomas. since a great number of small lymph nodes are missed in the traditional method, several fat clearing solutions have been introduced for easier detection of smaller lymph nodes. in this study we evaluated the efficacy of a new fat clearing solution so-called lymph node revealing solution (lnrs) in colecto...
background: the sentinel lymph node (sln) is defined as the first chain node in the lymphatic basin that receives primary lymphatic flow. if the sln is negative for metastatic disease, then other nodes are expected to be disease-free. sln techniques have been extensively applied in the staging and treatment of many tumors, including melanoma, breast and vulvar cancers. this study aims to evalua...
background: sentinel lymph node biopsy (slnb) has replaced axillary lymph node dissection (alnd) in early breast cancer patients as the first line surgical approach to axillary nodes. further dissection is performed only when sln is involved by tumor cells. however, in a significant proportion of patients, non-sentinel nodes are still not involved and axillary dissection has no additional thera...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید