Results 11 to 20 of about 100,623 (159)
In this study, the development of a platelet rich plasma (PRP) laden GelMA hydrogel contact lens is demonstrated. It is intended to allow sustained and controlled delivery of PRP to the ocular surface in a variety of ophthalmic conditions including but not limited to ocular surface thermal and chemical injuries, persistent epithelial defects and ...
Merve Nur Soykan +10 more
wiley +1 more source
Intrusion detection system using distributed multilevel discriminator in GAN for IoT system
The artificial‐based Internet of vehicles (IoV) systems is prone to high risks for cyber‐attacks. It is required to defend the network against multiple security attacks to reap the benefits by application to utilize the benefits of the IoV. Intrusion detection systems (IDSs) detect attacks reported from the attacker in the IoV system. For a large‐scale
M. Poongodi, Mounir Hamdi
wiley +1 more source
Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley +1 more source
LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios
This work presents both a recent review of already known LoRaWAN security issues for the available LoRaWAN versions and a novel list of preventive measures. Developers can use our findings to minimize the risks when developing applications for agriculture based on LoRaWAN.
Franz Kuntke +4 more
wiley +1 more source
[Retracted] Smart System Resource Coordination Algorithm Based on 6G Technology
Most of the existing resource allocation algorithms do not take into account the restriction conditions such as the delay limitation of different services and the service volume requirements of different STAs. Moreover, the surge in the number of smart terminal devices has brought great challenges to the access effect of WLAN systems.
Fang Wang, Wei Liu
wiley +1 more source
C SVM Classification and KNN Techniques for Cyber Crime Detection
In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to a boon as well as curse for those confronting the issues of privacy, national security, social decency, IP rights, child protection, fighting, detecting, and prosecuting cybercrime. Hence, there arises a need to detect the cybercriminal.
K. Veena +5 more
wiley +1 more source
COMPARATIVE CONTENT ANALYSIS OF THE WEBSITES OF GASTRONOMY CITIES REWARDED BY UNESCO CREATIVE CITIES NETWORK [PDF]
This study aims to evaluate the written and visual materials in the web sites of 26 cities that joined the Creative Cities Network under the category of gastronomy.
Sedat BÜTÜN, Sibel ÖNÇEL
doaj +1 more source
Within the last decade, Swarm Unmanned Aerial Vehicles (SUAVs) are booming and growing at a surprisingly rapid pace. From military combat, environmental surveillance, and air transport to the blossoming public entertainment sector, there is a wide range of UAV applications.
Manel Khelifi +2 more
wiley +1 more source
As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks ...
Ismail Butun, Patrik Osterberg
doaj +1 more source
One of the leading causes of deaths around the globe is heart disease. Heart is an organ that is responsible for the supply of blood to each part of the body. Coronary artery disease (CAD) and chronic heart failure (CHF) often lead to heart attack. Traditional medical procedures (angiography) for the diagnosis of heart disease have higher cost as well ...
Ashir Javeed +6 more
wiley +1 more source

