Results 51 to 60 of about 774,525 (334)

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Noise enhanced performance of adiabatic quantum computing by lifting degeneracies

open access: yes, 2010
We investigate the symmetry breaking role of noise in adiabatic quantum computing using the example of the CNOT gate. In particular, we analyse situations where the choice of initial configuration leads to symmetries in the Hamiltonian and degeneracies ...
A. M. Zagoskin   +6 more
core   +1 more source

Prediction of Myasthenia Gravis Worsening: A Machine Learning Algorithm Using Wearables and Patient‐Reported Measures

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein   +7 more
wiley   +1 more source

Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things

open access: yesSensors, 2018
Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes.
Ping Xie   +4 more
doaj   +1 more source

Impact of Outdated CSI on the Secure Communication in Untrusted In-Band Full-Duplex Relay Networks

open access: yesIEEE Access, 2022
To provide reliable connectivity in recent and future wireless communication systems, it is necessary to deploy several relay nodes. Further, a full-duplex (FD) technique has been in the spotlight since it can significantly improve spectral efficiency ...
Jin-Taek Lim, Taehoon Kim, Inkyu Bang
doaj   +1 more source

Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

open access: yes, 2013
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming   +2 more
core   +1 more source

Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]

open access: yes, 2017
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W.   +3 more
core   +2 more sources

Predicting Epileptogenic Tubers in Patients With Tuberous Sclerosis Complex Using a Fusion Model Integrating Lesion Network Mapping and Machine Learning

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu   +11 more
wiley   +1 more source

Power and Time Slot Allocation Method for Secured Satellite Transmission Based on Weighted Fractional Data Carrying Artificial Noise

open access: yesIEEE Access, 2018
In this paper, a power and time slot allocation method is proposed for the weighted fractional data carrying artificial noise (DCAN) to secure satellite transmission.
Ruiyang Xu   +4 more
doaj   +1 more source

Improving Physical Layer Security of Cooperative NOMA System with Wireless-Powered Full-Duplex Relaying

open access: yesInformation, 2021
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively.
Yuan Ren   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy