Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. For this purpose, it is a fundamental issue to characterize the WSN… (More)
The integration of different technologies with different capabilities and functionalities is an extremely complex task and involves issues at all the layers of the protocol stack. The authors envision an architecture for state-of-the-art heterogeneous multi-hop networks.
Resting-state functional magnetic resonance imaging (RS-fMRI) has been considered for development as a biomarker and analytical tool for evaluation of Parkinson's disease (PD). Here we utilized analysis of the amplitude low-frequency ﬂuctuations (ALFF) to determine changes in intrinsic neural oscillations in 72 patients with PD. Two different frequency… (More)
The integration of the Internet and ad hoc mobile hosts can be used to eliminate dead zones in wireless network, and can also be used to extend the coverage of wireless networks. The integration enriches the application range of ad hoc networks. Earlier approaches for the integrated networks either provided only unidirectional global connectivity for ad hoc… (More)
AIMS Transforming growth factor-beta1 (TGF-beta1) is a multifunctional cytokine that contributes to pathogenic cardiac remodelling via mechanisms that involve oxidative stress. However, the direct impact of TGF-beta1 on contractile function of ventricular myocytes is incompletely understood. METHODS AND RESULTS Reactive oxygen species (ROS) production and… (More)
A wireless sensor network (WSN) has to maintain a desirable sensing coverage and periodically report sensed data to the administrative center (i.e., base station) and the reporting period may range from months to years. Coverage and lifetime are two paramount problems in a WSN due to constraint of associated battery power. All previous theoretical analysis… (More)