Results 41 to 50 of about 1,051 (211)

Experimental Test of Tracking the King Problem

open access: yes, 2019
In quantum theory, the retrodiction problem is not as clear as its classical counterpart because of the uncertainty principle of quantum mechanics. In classical physics, the measurement outcomes of the present state can be used directly for predicting ...
Cao, Zhu   +9 more
core   +1 more source

Resilience support in software-defined networking:a survey [PDF]

open access: yes, 2015
Software-defined networking (SDN) is an architecture for computer networking that provides a clear separation between network control functions and forwarding operations.
da Silva, Anderson   +3 more
core   +1 more source

Silencing of Salmonella typhimurium Pathogenesis: Atenolol Acquires Efficient Anti-Virulence Activities

open access: yesMicroorganisms, 2022
The targeting of bacterial virulence is proposed as a promising approach to overcoming the bacterial resistance development to antibiotics. Salmonella enterica is one of the most important gut pathogens that cause a wide diversity of local and systemic ...
Abrar K. Thabit   +7 more
doaj   +1 more source

Intelligent OFDM telecommunication system. Part 3. Anti-eavesdropping and anti-jamming properties of system, based on many-parameter wavelet and Golay transforms [PDF]

open access: yes, 2019
In this paper, we aim to investigate the superiority and practicability of many-parameter Fourier transforms (MPFT) from the physical layer security (PHY-LS) perspective.
Chasovskikh, V. P.   +4 more
core  

Universal Entanglement and an Information‐Complete Quantum Theory

open access: yesAdvanced Physics Research, EarlyView.
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley   +1 more source

Intelligent OFDM telecommunication system. Part 1. Model of complex and quaternion systems [PDF]

open access: yes, 2019
In this paper, we aim to investigate the superiority and practicability of many-parameter transforms (MPTs) from the physical layer security (PHY-LS) perspective. We propose novel Intelligent OFDM-telecommunication systems based on complex and quaternion
Labunets, V. G., Ostheimer, E. V.
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Intelligent OFDM telecommunication system. Part 4. Anti-eavesdropping and anti-jamming properties of the system, based on many-parameter and fractional Fourier transforms [PDF]

open access: yes, 2019
In this paper, we aim to investigate the superiority and practicability of many-parameter wavelet and Golay transforms (MPWT and MPGT) from the physical layer security (PHY-LS) perspective.
Chasovskikh, V. P.   +4 more
core   +1 more source

Securing UAV Communications Via Trajectory Optimization

open access: yes, 2017
Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due to many advantages such as low cost, high mobility, and on-demand deployment. This paper addresses the issue of physical-layer security in a UAV communication system,
Cui, Miao   +3 more
core   +1 more source

Resource Allocation for Enhancing Offloading Security in NOMA-Enabled MEC Networks [PDF]

open access: yes, 2021
This letter studies an uplink non-orthogonal multiple access (NOMA) enabled mobile-edge computing (MEC) network. Specifically, we focus on the practical design of secure offloading without knowing the eavesdropper’s channel state information.
Li, C   +5 more
core  

Home - About - Disclaimer - Privacy