communication network
Recently Published Documents


TOTAL DOCUMENTS

3991
(FIVE YEARS 1684)

H-INDEX

57
(FIVE YEARS 19)

2023 ◽  
Vol 1 (1) ◽  
pp. 1
Author(s):  
Olalekan Ogunbiyi ◽  
Olusola Kunle Akinde ◽  
Ahmed Wasiu Akande ◽  
Akinyinka Olukunle Akande ◽  
Cosmas Kemdirim Agubor

Author(s):  
Jiří Jelínek ◽  
Jiří Čejka ◽  
Josef Šedivý

Intelligent transportation systems (ITS) are a today´s hot topic, especially in the context of the development of information technologies, which can be employed in transportation. Although the scope and the technical solution of these systems may vary, they are frequently based on VANET (Vehicular ad hoc network), i.e. a communication network, which is primarily generated among the moving subjects, which form ITS. Given the highly dynamic VANET, the questions are raised as to the data transmission. This paper is aimed to make a detail analysis of the communications within VANET using the simulation model, which includes the static infrastructure of ITS and to experimentally verify the impact of this infrastructure on the dynamics of information spreading in ITS. The authors present the results obtained from a few different scenarios, which have been tested.


2022 ◽  
Vol 2022 ◽  
pp. 1-8
Author(s):  
Ruicheng Li ◽  
Heng Chen

Nowadays, individuals with and without technical knowledge have started utilizing the technology to a broader extent. The utilization of technology has gone deeper concerning gadgets that aid in wireless communication with anyone or anything. This advancement has paved the way for a trending technology named wireless communication network (WCN) in recent years. In addition to this, there has been a significant change and development in the field of trading goods. Manual ordering of goods has changed to online ordering, and hence, supply chain management. This research focuses on applying WCN to a logistic tracking information system (LTIS) for a university with automatic control of the system. A novel algorithm named intelligent logistics system construction algorithm is implemented to evaluate the efficiency and performance of data. This model aids in the tracking goods and automatic control of university logistics.


2022 ◽  
Vol 2022 ◽  
pp. 1-11
Author(s):  
Hongyi Wang ◽  
Meichang Zhang

The sublevel caving method without sill pillar is used to improve the cost of mining. The analysis is performed according to unique geographical environment and the current mining technology of the mine. The wireless communication network is used to budget and control the work cost of mining. Simulation operation about unit explosive dosage, fan-shaped deep hole interval, hole bottom distance, and collapse step distance is performed. Experiments have shown that budget and control of the cost of mining workers with wireless communication technology can manage mining data and guide the design of mining data.


Gut ◽  
2022 ◽  
pp. gutjnl-2021-324994
Author(s):  
Carolina F Ruivo ◽  
Nuno Bastos ◽  
Barbara Adem ◽  
Ines Batista ◽  
Cecilia Duraes ◽  
...  

ObjectiveIntratumor heterogeneity drives cancer progression and therapy resistance. However, it has yet to be determined whether and how subpopulations of cancer cells interact and how this interaction affects the tumour.DesignWe have studied the spontaneous flow of extracellular vesicles (EVs) between subpopulations of cancer cells: cancer stem cells (CSC) and non-stem cancer cells (NSCC). To determine the biological significance of the most frequent communication route, we used pancreatic ductal adenocarcinoma (PDAC) orthotopic models, patient-derived xenografts (PDXs) and genetically engineered mouse models (GEMMs).ResultsWe demonstrate that PDAC tumours establish an organised communication network between subpopulations of cancer cells using EVs called the EVNet). The EVNet is plastic and reshapes in response to its environment. Communication within the EVNet occurs preferentially from CSC to NSCC. Inhibition of this communication route by impairing Rab27a function in orthotopic xenographs, GEMMs and PDXs is sufficient to hamper tumour growth and phenocopies the inhibition of communication in the whole tumour. Mechanistically, we provide evidence that CSC EVs use agrin protein to promote Yes1 associated transcriptional regulator (YAP) activation via LDL receptor related protein 4 (LRP-4). Ex vivo treatment of PDXs with antiagrin significantly impairs proliferation and decreases the levels of activated YAP.Patients with high levels of agrin and low inactive YAP show worse disease-free survival. In addition, patients with a higher number of circulating agrin+ EVs show a significant increased risk of disease progression.ConclusionPDAC tumours establish a cooperation network mediated by EVs that is led by CSC and agrin, which allows tumours to adapt and thrive. Targeting agrin could make targeted therapy possible for patients with PDAC and has a significant impact on CSC that feeds the tumour and is at the centre of therapy resistance.


2022 ◽  
Vol 2022 ◽  
pp. 1-15
Author(s):  
Muhammad Umar Farooq ◽  
Rukhshanda Anjum ◽  
Abdul Gaffar ◽  
Huma Bashir ◽  
Naziha Al-Aidroos ◽  
...  

Neutrosophic set (NS) is an extensively used framework whenever the imprecision and uncertainty of an event is described based on three possible aspects. The association, neutral, and nonassociation degrees are the three unique aspects of an NS. More importantly, these degrees are independent which is a great plus point. On the contrary, neutrosophic graphs (NGs) and single-valued NGs (SVNGs) are applicable to deal with events that contain bulks of information. However, the concept of degrees in NGs is a handful tool for solving the problems of decision-making (DM), pattern recognition, social network, and communication network. This manuscript develops various forms of edge irregular SVNG (EISVNG), highly edge irregular SVNG (HEISVNG), strongly (EISVNG), strongly (ETISVNG), and edge irregularity on a cycle and a path in SVNGs. All these novel notions are supported by definitions, theorems, mathematical proofs, and illustrative examples. Moreover, two types of DM problems are modelled using the proposed framework. Furthermore, the computational processes are used to confirm the validity of the proposed graphs. Furthermore, the results approve that the decision-making problems can be addressed by the edge irregular neutrosophic graphical structures. In addition, the comparison between proposed and the existing methodologies is carried out.


Author(s):  
Zsombor Petho ◽  
Intiyaz Khan ◽  
Árpád Torok

AbstractThis article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.


2022 ◽  
Vol 32 (2) ◽  
pp. 1225-1239
Author(s):  
Jingtang Luo ◽  
Jingru Liao ◽  
Chenlin Zhang ◽  
Ziqi Wang ◽  
Yuhang Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document