Results 51 to 60 of about 774,525 (334)
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Noise enhanced performance of adiabatic quantum computing by lifting degeneracies
We investigate the symmetry breaking role of noise in adiabatic quantum computing using the example of the CNOT gate. In particular, we analyse situations where the choice of initial configuration leads to symmetries in the Hamiltonian and degeneracies ...
A. M. Zagoskin +6 more
core +1 more source
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein +7 more
wiley +1 more source
Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things
Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes.
Ping Xie +4 more
doaj +1 more source
Impact of Outdated CSI on the Secure Communication in Untrusted In-Band Full-Duplex Relay Networks
To provide reliable connectivity in recent and future wireless communication systems, it is necessary to deploy several relay nodes. Further, a full-duplex (FD) technique has been in the spotlight since it can significantly improve spectral efficiency ...
Jin-Taek Lim, Taehoon Kim, Inkyu Bang
doaj +1 more source
Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming +2 more
core +1 more source
Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W. +3 more
core +2 more sources
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu +11 more
wiley +1 more source
In this paper, a power and time slot allocation method is proposed for the weighted fractional data carrying artificial noise (DCAN) to secure satellite transmission.
Ruiyang Xu +4 more
doaj +1 more source
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively.
Yuan Ren +3 more
doaj +1 more source

