排序方式: 共有42条查询结果,搜索用时 15 毫秒
31.
Dr. Shivakrishna Kallepu Praveen Kumar Neeli Sreevidya Mallappa Narendra Kumar Nagendla Mohana Krishna Reddy Mudiam Dr. Prathama S. Mainkar Dr. Srigiridhar Kotamraju Dr. Srivari Chandrasekhar 《ChemMedChem》2020,15(19):1826-1833
Late-stage functionalization (LSF) aids drug discovery efforts by introducing functional groups onto C−H bonds on pre-existing skeletons. We adopted the LSF strategy to synthesize analogues of the abundantly available triterpenoid, glycyrrhetinic acid (GA), by introducing aryl groups in the A-ring, expanding the A-ring and selectively activating one methyl group of the gem-dimethyl groups. Intriguingly, two compounds were found to preferentially accumulate in the mitochondrial compartment of MDA-MB-231 breast cancer cells, to cause depolarization of mitochondrial membrane potential and to induce antiproliferative and anti-invasive effects through enhanced mitochondrial superoxide production with parallel depletion of GSH levels. Furthermore, intraperitoneal administration of these two compounds, in comparison with GA, greatly regressed breast tumor growth and metastasis in a SCID mouse model bearing labeled MDA-MB-231 cells. 相似文献
32.
33.
This paper discusses the past, the present, and the future of digital home and in particular, how convergence transforms home
networking. It describes technology adoption-, consumer-, and behavioural-trends and discusses the business impact from consumer
demand for “living in real-time” and from the convergence of applications, services, networks, and terminals. With the explosion
of mobile and broadband usage with high Wi-Fi penetration at home and emerging trends such as online social networks, mashups,
blogs, etc. will create unparalleled value to customers that will disrupt existing business models of fixed and mobile operators.
Consumers expect access to applications and services instantaneously, irrespective of the location, place and all at real-time.
Telco’s and business are beginning to understand how those behavioural trends, and convergence could have major impact on
their service offering, marketing, products, price, go-to-market and how they can leverage these trends to attract and seek
global talents. Proliferation of IP enabled device and applications will lead to the development of IP-based home networking
in the areas of personal communications, network entertainment, communications and monitoring & management. Finally, a new
law was established that will drive the future development of digital home, E = mc3, where E equates to Entertainment experience, m for media (content) and c3 for convergence of communications, computing technologies and consumer electronics. Success of home networking will heavily
depend on industries ability to hide networks and systems complexities from end-users where simplicity of the user interface
is the key.
相似文献
Neeli Rashmi Prasad (Corresponding author)Email: |
34.
Khwandah Sinan A. Cosmas John P. Lazaridis Pavlos I. Glover Ian A. Zaharis Zaharias D. Prasad Neeli R. 《Wireless Personal Communications》2019,107(3):1491-1505
Wireless Personal Communications - Unlike terrestrial environment, the underwater environment possess additional and complicated challenges for wireless communication. For the underwater wireless... 相似文献
35.
Pranav M. Pawar Rasmus H. Nielsen Neeli R. Prasad Ramjee Prasad 《Wireless Personal Communications》2018,100(2):267-281
The cost efficiency of wireless platforms and their easy deployment enable the applicability of it in widespread application domains. Wireless sensor networks (WSNs) are not excluded from it. Their application domains vary from industrial monitoring to military applications. A WSN is a resource-constrained network and energy of the WSN node is a valuable resource. Like every other network, WSNs are also vulnerable to security attacks. A security attack can results in networks consuming more resources, leading to earlier depletion of node energy. A significant part of the resource consumption in a WSN is controlled by the medium access control (MAC) mechanism. This paper focuses on WSN MAC mechanisms and countermeasures for attacks targeting the MAC layer in a WSN. Denial of sleep attacks are the most relevant for WSN MAC as these types of attacks have shattered effects, which bring down the sensor lifetime from years to days. This paper proposes a secure hybrid MAC mechanism, Green and Secure Hybrid Medium Access Control (GSHMAC) to overcome the devastating effect of WSN MAC attacks. The proposed mechanism provides features such as collision threshold-based MAC mode control and countermeasures on WSN MAC using internal MAC mechanisms. GSHMAC shows improved energy-efficiency, delay, and throughput in the presence of attacks, as compared with state-of-art secure MAC mechanisms. 相似文献
36.
37.
38.
Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that involves many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad hoc network, making it having no hierarchal structure, complicating management tasks. Deploying new technology without security in mind has often proved to be unreasonably dangerous.One of the most fundamental rights in a 'healthy' society is the right of every citizen to be left alone. Article 12 of the U.N, Universal Declaration of Human Rights, states that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”, in reality, though this right is increasingly being trod upon, along with undreamed of comforts and conveniences for the population in general. The digital revolution has made it possible to gather as well as store information about human behaviour on a massive scale. We leave electronic footprints everywhere we go, footprints that are being watched, analyzed and sold without our knowledge or even control.With this Security and Privacy solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN).This paper analyses the security issues, threats and attacks and requirements of wireless sensor networks. This paper further proposes security framework and security architecture to integrate existing technologies with WSN technology, to provide secure and private communications to its users.
Neeli Rashmi Prasad, Associate Professor and Head of Wireless Security and Sensor Networks Lab., part of Wireless Network including Embedded systems Group (WING), Center for TeleInfrastruktur (CTIF), Aalborg University, Aalborg, Denmark. She received her Ph.D. from University of Rome “Tor Vergata”, Rome, Italy, in the field of “adaptive security for wireless heterogeneous networks” in 2004 and M.Sc. (Ir.) degree in Electrical Engineering from Delft University of Technology, The Netherlands, in the field of “Indoor Wireless Communications using Slotted ISMA Protocols” in 1997. She joined Libertel (now Vodafone NL), Maastricht, The Netherlands as a Radio Engineer in 1997. From November 1998 till May 2001, she worked as Systems Architect for Wireless LANs in Wireless Communications and Networking Division of Lucent Technologies (now Agere Systems), Nieuwegein, The Netherlands. From June 2001 to July 2003, she was with T-Mobile Netherlands, The Hague, The Netherlands as Senior Architect for Core Network Group. Subsequently, from July 2003 to April 2004, she was Senior Research Manager at PCOM:I3, Aalborg, Denmark.During her industrial career she coordinated several projects. Just to name few major ones: country wide GSM landmass coverage (Vodafone NL), the impact of IP based security on Lucent WLAN (Wavelan later known as Orinoco) Access Points (APs), implementation of Virtual LAN and IAPP on Orinoco APs, VoIP implementation on APs, design and implementation of real-time embedded software platform for APs, mobile core network evolution towards All-IP for T-Mobile International to technical project lead for Public WLAN deployment for T-Mobile NL.Her publications range from top journals, international conferences and chapters in books. She has also co-edited and co-authored two books titled
“WLAN Systems and Wireless IP for Next Generation Communications” and “Wireless LANs and Wireless IP Security, Mobility, QoS and Mobile Network Integration”, published by Artech House, 2001 and 2005. She has supervised several Masters Students projects.In December 1997 she won Best Paper award for her work on ISMA Protocol (Inhibit Sense Multiple Access). Her current research interest lies in wireless security, mobility, mesh networks, WSN, WPAN and heterogeneous networks.She was the Technical Program Committee Co-Chair IWS2005/WPMC05 held on September 18–22, 2005 in Aalborg. She is the Project Coordinator of EC Network of Excellence Project CRUISE on Wireless Sensor Networks. She is also cluster leader of EC Cluster for Sensor Networks.
Mahbubul Alam, Ph.D. student at Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark. He is with Cisco Systems, Inc. Netherlands from 2001 and worked as Consulting Systems Engineer in the field of mobile and wireless technology and since September 2002 he works as Business Analyst in areas of mobile, wireless and security. He is now based in Cisco Systems, Inc. San Jose, CA, USA, with focus on home networking, wireless and security. Previously he was with Siemens Netherlands as Systems Engineer and as Technical Team Leader of UMTS group. He received M. Sc. degree in Electrical & Electronic Engineering from Delft University of Technology, The Netherlands in 1998. He has published several papers at international conferences, journals, IEEE communication magazine and chapters for books. His research interest is in the field of wireless sensor networks. 相似文献
39.
Charalampos Z. Patrikakis Dimitris M. Kyriazanos Neeli R. Prasad 《Wireless Personal Communications》2009,51(1):121-135
Security and privacy in Personal Networks constitute a major challenge for designers and implementers. The deployment of novel
services over a collaborative environment where users share their resources and profiles create higher demands on security
and privacy requirements. In this paper, the authors address the issue of privacy-enabled, secure personal information exchange
among participants of a Personal Networks federation, in order to establish trust. The paper proposes a novel model based
on the separation of user ID information from personal preferences and user status information. The proposed model is able
to ensure privacy through anonymity over personal data exchange, while it incorporates mechanisms for the detection and confronting
of malicious behavior, and resilience against attacks. A proof of concept based on an actual implementation is provided. Further,
discussion is presented on the issues that need to be tackled in order to incorporate the proposed model in a standard PN
architecture. 相似文献
40.
This paper presents a concept where applications are aware of security services in the low data rate (LDR) networks. Further, the paper compares the suitability of different security protocols and crypto-algorithms taking into account the security requirements and architectural issues for different LDR scenarios and finally present a new security concept ‘An Adaptive Security’ with the appropriate security protocols and crypto-algorithms for LDR networks. 相似文献