Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access


    Characteristics and expression of the TCP transcription factors family in Allium senescens reveal its potential roles in drought stress responses


    BIOCELL, Vol.47, No.4, pp. 905-917, 2023, DOI:10.32604/biocell.2023.026930

    Abstract Allium senescens, is an important economic and ecological grassland plant with drought-resistant characteristics. A TCP protein transcription factor is important in the regulation of plant development and adverse responses. However, the mechanism by which TCP transcription functions in drought resistance in Allium senescens is still not clear. Here, we obtained a total of 190,305 transcripts with 115,562 single gene clusters based on RNA-Seq sequencing of Allium senescens under drought stress. The total number of bases was 97,195,096 bp, and the average length was 841.06 bp. Furthermore, we found that there were eight genes of the TCP family that showed an… More >

  • Open Access


    Coupled CUBIC Congestion Control for MPTCP in Broadband Networks

    Jae Yong Lee1, Byung Chul Kim1, Youngmi Kwon1,*, Kimoon Han2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 99-115, 2023, DOI:10.32604/csse.2023.030801

    Abstract Recently, multipath transmission control protocol (MPTCP) was standardized so that data can be transmitted through multiple paths to utilize all available path bandwidths. However, when high-speed long-distance networks are included in MPTCP paths, the traffic transmission performance of MPTCP is severely deteriorated, especially in case the multiple paths’ characteristics are heavily asymmetric. In order to alleviate this problem, we propose a “Coupled CUBIC congestion control” that adopts TCP CUBIC on a large bandwidth-delay product (BDP) path in a linked increase manner for maintaining fairness with an ordinary TCP traversing the same bottleneck path. To verify the performance excellence of the… More >

  • Open Access


    Deep Reinforcement Extreme Learning Machines for Secured Routing in Internet of Things (IoT) Applications

    K. Lavanya1,*, K. Vimala Devi2, B. R. Tapas Bapu3

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 837-848, 2022, DOI:10.32604/iasc.2022.023055

    Abstract Multipath TCP (SMPTCP) has gained more attention as a valuable approach for IoT systems. SMPTCP is introduced as an evolution of Transmission Control Protocol (TCP) to pass packets simultaneously across several routes to completely exploit virtual networks on multi-homed consoles and other network services. The current multipath networking algorithms and simulation software strategies are confronted with sub-flow irregularity issues due to network heterogeneity, and routing configuration issues can be fixed adequately. To overcome the issues, this paper proposes a novel deep reinforcement-based extreme learning machines (DRLELM) approach to examine the complexities between routes, pathways, sub-flows, and SMPTCP connections in different… More >

  • Open Access


    Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture

    Mingxing Zhu, Yansong Wang, Ruyun Zhang, Tianning Zhang, Heyuan Li, Hanguang Luo, Shunbin Li*

    Journal on Internet of Things, Vol.3, No.3, pp. 99-107, 2021, DOI:10.32604/jiot.2021.014921

    Abstract The Mimic Defense (MD) is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy (DHR) architecture. It can effectively resist unknown vulnerabilities, backdoors, and other security threats by schedule strategy, negative feedback control, and other mechanisms. To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol. This paper proposes a TCP protocol normalization scheme for DHR architecture. Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture. More >

  • Open Access


    An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks

    Abdelwahed Berguiga*, Ahlem Harchay

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3839-3851, 2022, DOI:10.32604/cmc.2022.023399

    Abstract The success of Internet of Things (IoT) deployment has emerged important smart applications. These applications are running independently on different platforms, almost everywhere in the world. Internet of Medical Things (IoMT), also referred as the healthcare Internet of Things, is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems. Indeed, with the impact of the COVID-19 pandemic, a large number of interconnected devices designed to create smart networks. These networks monitor patients from remote locations as well as tracking medication orders. However, IoT may be jeopardized by attacks… More >

  • Open Access


    Fault Management Cyber-Physical Systems in Virtual Storage Model

    Kailash Kumar*, Ahmad Abdullah Aljabr

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3781-3801, 2022, DOI:10.32604/cmc.2022.020510

    Abstract On average, every two years, the amount of data existing globally doubles. Software development will be affected and improved by Cyber-Physical Systems (CPS). The number of problems remained even though developments helped Information Technology experts extract better value from their storage investments. Because of poor interoperability between different vendors and devices, countless numbers of Storage Area Networks were created. Network setup used for data storage includes a complex and rigid arrangement of routers, switch, hosts/servers, storage arrays. We have evaluated the performance of routing protocol Transmission Control Protocol (TCP) and Fibre Channel Protocol (FCP) under different network scenario by Network… More >

  • Open Access


    An Improved TCP Vegas Model for the Space Networks of the Bandwidth Asymmetry

    Qixue Guan*, Yueqiu Jiang

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 773-781, 2020, DOI:10.32604/iasc.2020.010112

    Abstract It is known that congestion in the reverse direction happens in advance of the congestion in the forward direction due to the significant bandwidth asymmetry in the two directions of the space networks, especially in the satellite networks, which enables the TCP Vegas to enter the phase of the congestion avoidance blindly and reduce the throughput of the forward direction. To solve this problem, a congestion control model, TCP Vegas-DDA, which maintains the frequency of the acknowledgments in the reverse direction is proposed. The model sets the interval time between acknowledgments dynamically based on the variation of the queuing delay… More >

  • Open Access


    Practice variation in the management of patent ductus arteriosus in extremely low birth weight infants in the United States: Survey results among cardiologists and neonatologists

    Shyam Sathanandam1, Stephanie Whiting1, Jorden Cunningham1, David Zurakowski2, Leah Apalodimas1, B. Rush Waller1, Ranjit Philip1, Athar M. Qureshi3

    Congenital Heart Disease, Vol.14, No.1, pp. 6-14, 2019, DOI:10.1111/chd.12729

    Abstract Background: Patent ductus arteriosus (PDA) is highly prevalent in extremely low birth weight (ELBW), preterm infants. There are diverse management approaches for the PDA in ELBW infants. The objectives of this research were to identify current PDA management practices among cardiologists and neonatologists in the United States, describe any significant differences in management, and describe areas where practices align.
    Methods: A survey of 10 questions based on the management of PDA in ELBW infants was conducted among 100 prominent neonatologists from 74 centers and 103 prominent cardiologists from 75 centers. Among the cardiologists, approximately 50% were interventionists who perform transcatheter… More >

  • Open Access


    Live broadcast of transcatheter PDA closure in a 700 grams ELBW infant during the International PDA Symposium

    Shyam Sathanandam, Ashley Gianinni, Eric Sefton, Kaitlyn Greer, Nathan Stecchi, Kimberly Allen, Ranjit Philip, B. Rush Waller

    Congenital Heart Disease, Vol.14, No.1, pp. 85-89, 2019, DOI:10.1111/chd.12710

    Abstract Objective: The objective of this article is to describe a live case transmission of tran‐ scatheter closure of a patent ductus arteriosus (PDA) in an extremely low birth weight (ELBW) infant during the first International PDA Symposium conducted in Memphis, Tennessee.
    Setting: A multidisciplinary team approach including audiovisual specialists, informa‐ tion technology specialists, physicians, nurses, and other health care specialists was required to perform the transcatheter PDA closure (TCPC) in an ELBW infant at LeBonheur Children’s Hospital and the procedure was broadcast live to the attend‐ ees at the International PDA Symposium allowing for a two‐way audiovisual discus‐ sion during… More >

  • Open Access


    TCPW BR: A Wireless Congestion Control Scheme Base on RTT

    Liwei Tian1, 2, *, Jinfeng Li3, Longqing Zhang2, Yu Sun4, Lei Yang2

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 233-244, 2020, DOI:10.32604/cmc.2020.06135

    Abstract The wireless network is limited by the transmission medium, and the transmission process is subject to large interference and jitter. This jitter can cause sporadic loss and is mistaken for congestion by the congestion control mechanism. The TCP Westwood protocol (referred to as TCPW) is such that it cannot distinguish between congestion loss and wireless jitter loss, which makes the congestion mechanism too sensitive and reduces bandwidth utilization. Based on this, the TCPW protocol is modified based on the estimate of the Round-Trip Time (referred to as RTT) value-called TCPW BR. The algorithm uses the measured smooth RTT value and… More >

Displaying 1-10 on page 1 of 12. Per Page  

Share Link

WeChat scan