Results 11 to 20 of about 100,623 (159)

Developing a Novel Platelet‐Rich Plasma‐Laden Bioadhesive Hydrogel Contact Lens for the Treatment of Ocular Surface Chemical Injuries

open access: yesMacromolecular Bioscience, Volume 23, Issue 12, December 2023., 2023
In this study, the development of a platelet rich plasma (PRP) laden GelMA hydrogel contact lens is demonstrated. It is intended to allow sustained and controlled delivery of PRP to the ocular surface in a variety of ophthalmic conditions including but not limited to ocular surface thermal and chemical injuries, persistent epithelial defects and ...
Merve Nur Soykan   +10 more
wiley   +1 more source

Intrusion detection system using distributed multilevel discriminator in GAN for IoT system

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 34, Issue 11, November 2023., 2023
The artificial‐based Internet of vehicles (IoV) systems is prone to high risks for cyber‐attacks. It is required to defend the network against multiple security attacks to reap the benefits by application to utilize the benefits of the IoV. Intrusion detection systems (IDSs) detect attacks reported from the attacker in the IoV system. For a large‐scale
M. Poongodi, Mounir Hamdi
wiley   +1 more source

Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

open access: yesIET Networks, Volume 12, Issue 1, Page 1-8, January 2023., 2023
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley   +1 more source

 LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 33, Issue 5, May 2022., 2022
This work presents both a recent review of already known LoRaWAN security issues for the available LoRaWAN versions and a novel list of preventive measures. Developers can use our findings to minimize the risks when developing applications for agriculture based on LoRaWAN.
Franz Kuntke   +4 more
wiley   +1 more source

[Retracted] Smart System Resource Coordination Algorithm Based on 6G Technology

open access: yesJournal of Electrical and Computer Engineering, Volume 2022, Issue 1, 2022., 2022
Most of the existing resource allocation algorithms do not take into account the restriction conditions such as the delay limitation of different services and the service volume requirements of different STAs. Moreover, the surge in the number of smart terminal devices has brought great challenges to the access effect of WLAN systems.
Fang Wang, Wei Liu
wiley   +1 more source

C SVM Classification and KNN Techniques for Cyber Crime Detection

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to a boon as well as curse for those confronting the issues of privacy, national security, social decency, IP rights, child protection, fighting, detecting, and prosecuting cybercrime. Hence, there arises a need to detect the cybercriminal.
K. Veena   +5 more
wiley   +1 more source

COMPARATIVE CONTENT ANALYSIS OF THE WEBSITES OF GASTRONOMY CITIES REWARDED BY UNESCO CREATIVE CITIES NETWORK [PDF]

open access: yesGeo Journal of Tourism and Geosites, 2019
This study aims to evaluate the written and visual materials in the web sites of 26 cities that joined the Creative Cities Network under the category of gastronomy.
Sedat BÜTÜN, Sibel ÖNÇEL
doaj   +1 more source

Swarm Unmanned Aerial Vehicles (SUAVs): A Comprehensive Analysis of Localization, Recent Aspects, and Future Trends

open access: yesJournal of Sensors, Volume 2022, Issue 1, 2022., 2022
Within the last decade, Swarm Unmanned Aerial Vehicles (SUAVs) are booming and growing at a surprisingly rapid pace. From military combat, environmental surveillance, and air transport to the blossoming public entertainment sector, there is a wide range of UAV applications.
Manel Khelifi   +2 more
wiley   +1 more source

A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things

open access: yesIEEE Access, 2021
As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks ...
Ismail Butun, Patrik Osterberg
doaj   +1 more source

[Retracted] Machine Learning‐Based Automated Diagnostic Systems Developed for Heart Failure Prediction Using Different Types of Data Modalities: A Systematic Review and Future Directions

open access: yesComputational and Mathematical Methods in Medicine, Volume 2022, Issue 1, 2022., 2022
One of the leading causes of deaths around the globe is heart disease. Heart is an organ that is responsible for the supply of blood to each part of the body. Coronary artery disease (CAD) and chronic heart failure (CHF) often lead to heart attack. Traditional medical procedures (angiography) for the diagnosis of heart disease have higher cost as well ...
Ashir Javeed   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy