首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41篇
  免费   1篇
化学工业   3篇
无线电   38篇
自动化技术   1篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   1篇
  2018年   6篇
  2016年   3篇
  2015年   1篇
  2014年   4篇
  2013年   4篇
  2012年   7篇
  2011年   3篇
  2010年   3篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2004年   2篇
  2001年   1篇
排序方式: 共有42条查询结果,搜索用时 15 毫秒
31.
Late-stage functionalization (LSF) aids drug discovery efforts by introducing functional groups onto C−H bonds on pre-existing skeletons. We adopted the LSF strategy to synthesize analogues of the abundantly available triterpenoid, glycyrrhetinic acid (GA), by introducing aryl groups in the A-ring, expanding the A-ring and selectively activating one methyl group of the gem-dimethyl groups. Intriguingly, two compounds were found to preferentially accumulate in the mitochondrial compartment of MDA-MB-231 breast cancer cells, to cause depolarization of mitochondrial membrane potential and to induce antiproliferative and anti-invasive effects through enhanced mitochondrial superoxide production with parallel depletion of GSH levels. Furthermore, intraperitoneal administration of these two compounds, in comparison with GA, greatly regressed breast tumor growth and metastasis in a SCID mouse model bearing labeled MDA-MB-231 cells.  相似文献   
32.
33.
This paper discusses the past, the present, and the future of digital home and in particular, how convergence transforms home networking. It describes technology adoption-, consumer-, and behavioural-trends and discusses the business impact from consumer demand for “living in real-time” and from the convergence of applications, services, networks, and terminals. With the explosion of mobile and broadband usage with high Wi-Fi penetration at home and emerging trends such as online social networks, mashups, blogs, etc. will create unparalleled value to customers that will disrupt existing business models of fixed and mobile operators. Consumers expect access to applications and services instantaneously, irrespective of the location, place and all at real-time. Telco’s and business are beginning to understand how those behavioural trends, and convergence could have major impact on their service offering, marketing, products, price, go-to-market and how they can leverage these trends to attract and seek global talents. Proliferation of IP enabled device and applications will lead to the development of IP-based home networking in the areas of personal communications, network entertainment, communications and monitoring & management. Finally, a new law was established that will drive the future development of digital home, E = mc3, where E equates to Entertainment experience, m for media (content) and c3 for convergence of communications, computing technologies and consumer electronics. Success of home networking will heavily depend on industries ability to hide networks and systems complexities from end-users where simplicity of the user interface is the key.
Neeli Rashmi Prasad (Corresponding author)Email:
  相似文献   
34.
Wireless Personal Communications - Unlike terrestrial environment, the underwater environment possess additional and complicated challenges for wireless communication. For the underwater wireless...  相似文献   
35.
The cost efficiency of wireless platforms and their easy deployment enable the applicability of it in widespread application domains. Wireless sensor networks (WSNs) are not excluded from it. Their application domains vary from industrial monitoring to military applications. A WSN is a resource-constrained network and energy of the WSN node is a valuable resource. Like every other network, WSNs are also vulnerable to security attacks. A security attack can results in networks consuming more resources, leading to earlier depletion of node energy. A significant part of the resource consumption in a WSN is controlled by the medium access control (MAC) mechanism. This paper focuses on WSN MAC mechanisms and countermeasures for attacks targeting the MAC layer in a WSN. Denial of sleep attacks are the most relevant for WSN MAC as these types of attacks have shattered effects, which bring down the sensor lifetime from years to days. This paper proposes a secure hybrid MAC mechanism, Green and Secure Hybrid Medium Access Control (GSHMAC) to overcome the devastating effect of WSN MAC attacks. The proposed mechanism provides features such as collision threshold-based MAC mode control and countermeasures on WSN MAC using internal MAC mechanisms. GSHMAC shows improved energy-efficiency, delay, and throughput in the presence of attacks, as compared with state-of-art secure MAC mechanisms.  相似文献   
36.
37.
38.
Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that involves many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad hoc network, making it having no hierarchal structure, complicating management tasks. Deploying new technology without security in mind has often proved to be unreasonably dangerous.One of the most fundamental rights in a 'healthy' society is the right of every citizen to be left alone. Article 12 of the U.N, Universal Declaration of Human Rights, states that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”, in reality, though this right is increasingly being trod upon, along with undreamed of comforts and conveniences for the population in general. The digital revolution has made it possible to gather as well as store information about human behaviour on a massive scale. We leave electronic footprints everywhere we go, footprints that are being watched, analyzed and sold without our knowledge or even control.With this Security and Privacy solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN).This paper analyses the security issues, threats and attacks and requirements of wireless sensor networks. This paper further proposes security framework and security architecture to integrate existing technologies with WSN technology, to provide secure and private communications to its users. Neeli Rashmi Prasad, Associate Professor and Head of Wireless Security and Sensor Networks Lab., part of Wireless Network including Embedded systems Group (WING), Center for TeleInfrastruktur (CTIF), Aalborg University, Aalborg, Denmark. She received her Ph.D. from University of Rome “Tor Vergata”, Rome, Italy, in the field of “adaptive security for wireless heterogeneous networks” in 2004 and M.Sc. (Ir.) degree in Electrical Engineering from Delft University of Technology, The Netherlands, in the field of “Indoor Wireless Communications using Slotted ISMA Protocols” in 1997. She joined Libertel (now Vodafone NL), Maastricht, The Netherlands as a Radio Engineer in 1997. From November 1998 till May 2001, she worked as Systems Architect for Wireless LANs in Wireless Communications and Networking Division of Lucent Technologies (now Agere Systems), Nieuwegein, The Netherlands. From June 2001 to July 2003, she was with T-Mobile Netherlands, The Hague, The Netherlands as Senior Architect for Core Network Group. Subsequently, from July 2003 to April 2004, she was Senior Research Manager at PCOM:I3, Aalborg, Denmark.During her industrial career she coordinated several projects. Just to name few major ones: country wide GSM landmass coverage (Vodafone NL), the impact of IP based security on Lucent WLAN (Wavelan later known as Orinoco) Access Points (APs), implementation of Virtual LAN and IAPP on Orinoco APs, VoIP implementation on APs, design and implementation of real-time embedded software platform for APs, mobile core network evolution towards All-IP for T-Mobile International to technical project lead for Public WLAN deployment for T-Mobile NL.Her publications range from top journals, international conferences and chapters in books. She has also co-edited and co-authored two books titled “WLAN Systems and Wireless IP for Next Generation Communications” and “Wireless LANs and Wireless IP Security, Mobility, QoS and Mobile Network Integration”, published by Artech House, 2001 and 2005. She has supervised several Masters Students projects.In December 1997 she won Best Paper award for her work on ISMA Protocol (Inhibit Sense Multiple Access). Her current research interest lies in wireless security, mobility, mesh networks, WSN, WPAN and heterogeneous networks.She was the Technical Program Committee Co-Chair IWS2005/WPMC05 held on September 18–22, 2005 in Aalborg. She is the Project Coordinator of EC Network of Excellence Project CRUISE on Wireless Sensor Networks. She is also cluster leader of EC Cluster for Sensor Networks. Mahbubul Alam, Ph.D. student at Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark. He is with Cisco Systems, Inc. Netherlands from 2001 and worked as Consulting Systems Engineer in the field of mobile and wireless technology and since September 2002 he works as Business Analyst in areas of mobile, wireless and security. He is now based in Cisco Systems, Inc. San Jose, CA, USA, with focus on home networking, wireless and security. Previously he was with Siemens Netherlands as Systems Engineer and as Technical Team Leader of UMTS group. He received M. Sc. degree in Electrical & Electronic Engineering from Delft University of Technology, The Netherlands in 1998. He has published several papers at international conferences, journals, IEEE communication magazine and chapters for books. His research interest is in the field of wireless sensor networks.  相似文献   
39.
Security and privacy in Personal Networks constitute a major challenge for designers and implementers. The deployment of novel services over a collaborative environment where users share their resources and profiles create higher demands on security and privacy requirements. In this paper, the authors address the issue of privacy-enabled, secure personal information exchange among participants of a Personal Networks federation, in order to establish trust. The paper proposes a novel model based on the separation of user ID information from personal preferences and user status information. The proposed model is able to ensure privacy through anonymity over personal data exchange, while it incorporates mechanisms for the detection and confronting of malicious behavior, and resilience against attacks. A proof of concept based on an actual implementation is provided. Further, discussion is presented on the issues that need to be tackled in order to incorporate the proposed model in a standard PN architecture.  相似文献   
40.
This paper presents a concept where applications are aware of security services in the low data rate (LDR) networks. Further, the paper compares the suitability of different security protocols and crypto-algorithms taking into account the security requirements and architectural issues for different LDR scenarios and finally present a new security concept ‘An Adaptive Security’ with the appropriate security protocols and crypto-algorithms for LDR networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号