node isolation
Recently Published Documents


TOTAL DOCUMENTS

33
(FIVE YEARS 8)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Abdellah Nabou ◽  
My driss Laanaoui ◽  
Mohammed Ouzzif ◽  
Mohammed Alamine El houssaini

Abstract In the last recent years, the number of wireless devices has been growing and the security challenges increases too. Mobile Ad hoc Network (MANET) considers as a part of wireless network that connects mobile devices by using wireless channels without infrastructure. MANET use specific protocols to ensure the connectivity and exchange data between the source and destination. Optimized Link State Routing Protocol (OLSR) is a table-driven protocol that keep the route to all destination at any times, unfortunately it can be affected by many active routing attacks that reduce its performance by dropping the exchange packets or stopping the forward of data. In this paper we present a new approach to detect any active routing attacks by using the concept of Shapiro-Wilk test. Our method of detection is easy to implement and does not require any modification in the standard version of OLSR routing protocol as we will demonstrate by NS-3 simulations the detection of Black hole, Worm hole and Node isolation attacks that consider as most known attacks in MANET. A real experience is done by creating a small ad hoc network that connect six wireless devices by using OLSR protocol and finally we detect the presence of an active routing attack by applying our proposed method.


EP Europace ◽  
2021 ◽  
Vol 23 (Supplement_3) ◽  
Author(s):  
L Essmann ◽  
M El Hamriti ◽  
M Braun ◽  
M Khalaph ◽  
N Baridwan ◽  
...  

Abstract Funding Acknowledgements Type of funding sources: None. Introduction AV-node ablation (AVNA) is a common therapy option for rate control strategy of permanent atrial fibrillation. However, this therapy has numerous side-effects as bundle branch blocks and absence of escape rhythm. We have invented a new technique that isolates the AV node instead of ablation. Methods Our study includes 60 patients with 40 being treated with AVNA and 20 being treated with AV-node isolation (AVNI). In AVNI patient´s AV-node region was mapped using 3D navigation system. Ablation was performed around the previously mapped HIS-cloud regions isolating the atrium from the AV-node. In all cases in AVNI group ablation was performed with irrigated tip ablation catheter.  Procedure time, ablation points, fluoroscopy time and total DAP, escape rhythm and delta QRS among other data were measured and compared in these two methods. Statistical analysis was performed by SPSS software 27.0. Results No complications appeared in this study. In the AVNI group more ablation points were used (p < 0.01) but there was no significant difference in total procedure time (p = 0.730). With AVNI highly significantly less fluoroscopy time (1.4 vs. 4.7 minutes) and total DAP (40.75 vs. 382.85 µGym²) was achieved (p < 0.01). Moreover, the median change in QRS width was 0 ms in the AVNI group vs. 26 ms in the AVNA group (p < 0.01). Immediately postoperative the escape rhythm of the AVNI group was significantly higher than in the AVNA group (MRang = 37.38 vs. MRang = 27.06, p = 0.023). Conclusion AV-node isolation using 3D navigation mapping system is a safe and effective alternative to classic AVNA procedure with less radiation exposure and potential preservation of escape rhythm, which is a major benefit in case of a pacemaker failure. Figure 1. 3D Navigation pictures after successful AVNI with NavX-System (left panel) and CARTO 3-System (right panel). His cloud with yellow points. The Tricuspid annulus could be defined with different color (green on the left panel) or with the tag points (white points on the right panel). Modified left lateral to posterior view. Abstract Figure.


2019 ◽  
Vol 22 (4) ◽  
pp. 375-382
Author(s):  
Maxim Kalinin ◽  
Roman Demidov ◽  
Peter Zegzhda

The paper considers a combination of modern artificial neural networks (ANN) that solves the security relative task of intrusion prevention and vulnerabilities detection in cybernetic infrastructure with dynamic network topology. Self-organizing networks, WSN, m2m networks, IIoT, mesh networks are faced with the cyberthreats of specific character: dynamic routing failures, node isolation, DDoS attacks, traffic lack, etc. Most of them are caused by cybersecurity weaknesses: the software vulnerabilities and architectural features of dynamically reconfigured network. The existing methods of binary code analysis and intrusion detection can work with a small number of data sets, are designed for either code inspection or network checking, and are targeted for static networks with regular topology. The proposed neural model demonstrates an universal approach that deals with the cybersecurity weakness as a systems genuine property and attempts to approximate it using a hybrid deep ANN. The new ANN detects both the network security defects and binary code vulnerabilities at once with high accuracy (more than 0.97). It also shows good performance capacity processing big data of the undercontrolled network.


2019 ◽  
Vol 60 (12) ◽  
pp. 2797-2811 ◽  
Author(s):  
Niveditha Umesh Katyayini ◽  
P�ivi L H Rinne ◽  
Christiaan van der Schoot

Abstract The biosynthesis and roles of strigolactones (SLs) have been investigated in herbaceous plants, but so far, their role in trees has received little attention. In this study, we analyzed the presence, spatial/temporal expression and role of SL pathway genes in Populus tremula � Populus tremuloides. In this proleptic species, axillary buds (AXBs) become para-dormant at the bud maturation point, providing an unambiguous starting point to study AXB activation. We identified previously undescribed Populus homologs of DWARF27 (D27), LATERAL BRANCHING OXIDOREDUCTASE (LBO) and DWARF53-like (D53-like) and analyzed the relative expression of all SL pathway genes in root tips and shoot tissues. We found that, although AXBs expressed MORE AXILLARY GROWTH1 (MAX1) and LBO, they did not express MAX3 and MAX4, whereas nodal bark expressed high levels of all SL biosynthesis genes. By contrast, expression of the SL perception and signaling genes MAX2, D14 and D53 was high in AXBs relative to nodal bark and roots. This suggests that AXBs are reliant on the associated nodes for the import of SLs and SL precursors. Activation of AXBs was initiated by decapitation and single-node isolation. This rapidly downregulated SL pathway genes downstream of MAX4, although later these genes were upregulated coincidently with primordia formation. GR24-feeding counteracted all activation-related changes in SL gene expression but did not prevent AXB outgrowth showing that SL is ineffective once AXBs are activated. The results indicate that nodes rather than roots supply SLs and its precursors to AXBs, and that SLs may restrain embryonic shoot elongation during AXB formation and para-dormancy in intact plants.


2019 ◽  
Vol 16 (2) ◽  
pp. 609-615
Author(s):  
A. Karthikayen ◽  
Selvakumar S. Raja

The trustworthiness of the mobile nodes is considered as the predominant parameter for ensuring significant data dissemination in the ad hoc network. However, the selfishness activity of the mobile nodes minimizes the trust of the mobile nodes by dropping a considerable number of data packets in the network. The significant dropping of data packets by the selfish node introduces huge data overhead with increased latency and energy consumptions by increasing the number of retransmissions. In this paper, a Bates Distribution Inspired Trust Factor-based Selfish Node Detection Technique (BDITF-SNDT) is proposed for predominant detection of selfish behavior by investigating multiple levels of factors that contribute towards effective selfishness detection. This proposed BDITF-SNDT approach is also potent in enhancing the detection rate of selfishness through the multi-perspective analysis of each monitored mobile nodes' forwarding characteristics towards the benefits of the other interacting mobile nodes. The simulation experiments and results of the proposed BDITF-SNDT approach is determined to be enhanced on an average by 16% and 14% superior to the compared selfish node isolation approaches existing in the literature.


Sign in / Sign up

Export Citation Format

Share Document