Results 161 to 170 of about 8,015 (302)

Self-Sustainable Active Reconfigurable Intelligent Surfaces for Anti-Jamming in Wireless Communications

open access: yes
Wireless devices can be easily attacked by jammers during transmission, which is a potential security threat for wireless communications. Active reconfigurable intelligent surface (RIS) attracts considerable attention and is expected to be employed in ...
Cao, Yang   +3 more
core  

Beta2‐adrenergic agonist salbutamol exhibits enantioselective disposition in skeletal muscle of lean young men following oral administration

open access: yesDrug Testing and Analysis, EarlyView.
Oral administration of salbutamol shows enantioselective disposition in human skeletal muscle, favoring the (S)‐enantiomer with higher relative partitioning of the pharmacologically active (R)‐enantiomer in muscle. This is concerning from an anti‐doping point of view because the anabolic properties demonstrated for salbutamol can potentially be ...
Morten Hostrup   +5 more
wiley   +1 more source

Distributed massive UAV jamming optimization algorithm with artificial bee colony

open access: yesIET Communications, Volume 17, Issue 2, Page 197-206, January 2023., 2023
Abstract With the massive application of unmanned aerial vehicles (UAVs) in disaster relief, fire protection, security and other fields, jamming countermeasures to UAVs in airports and competition venues have become the core link of security in high‐level matches and important places. The existing jamming sources are mainly single point jamming. Due to
Peilin Chen, Haobo Li, Lejing Ma
wiley   +1 more source

Feasibility Study of UAV-Assisted Anti-Jamming Positioning

open access: green, 2020
Zijie Wang   +3 more
openalex   +2 more sources

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Experiment regarding magnetic fields with gravity

open access: yesIET Quantum Communication, Volume 3, Issue 4, Page 218-228, December 2022., 2022
Abstract This experiment was designed to test the string theory as a physical reality. The ground‐based device placed the N poles of the magnets upwards, north, south, east, and west. Coil Ass'Y was placed between 2 N poles with bearing covers on the top and bottom.
Jong Hoon Lee
wiley   +1 more source

The use of steroids in adult epilepsy: A systematic review

open access: yesEpilepsia Open, EarlyView.
Abstract Objective The objective of this study is to systematically review the clinical studies investigating the use of steroids in adult epilepsy. Methods This systematic review utilized Preferred Reporting Items for Systematic Review and Meta‐analysis Protocols (PRISMA‐P) to examine literature on the use of steroids in adult epilepsy.
Ruth Walsh   +2 more
wiley   +1 more source

Camouflage in lichen moths: Field predation experiments and avian vision modelling demonstrate the importance of wing pattern elements and background for survival

open access: yesJournal of Animal Ecology, Volume 91, Issue 12, Page 2358-2369, December 2022., 2022
This study is one of the first to integrate vision modelling, quantitative image analysis and field predation experiments using realistic models to objectively quantify the level and functional significance of background matching in a real species. Abstract Background matching is perhaps the most ubiquitous form of defensive camouflage in the animal ...
Cassandra J. Mark   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy