Results 21 to 30 of about 59,306 (232)
Treadmill exercise within lower body negative pressure protects leg lean tissue mass and extensor strength and endurance during bed rest. [PDF]
Leg muscle mass and strength are decreased during reduced activity and non-weight-bearing conditions such as bed rest (BR) and spaceflight. Supine treadmill exercise within lower body negative pressure (LBNPEX) provides full-body weight loading during BR
Feiveson, Alan H +5 more
core +1 more source
In the underlay cognitive radio networks, the radio environment maps (REMs) estimation is the main challenge in sensing the idle wireless spectrum resources.
Xu Han, Lei Xue, Ying Xu, Zunyang Liu
doaj +1 more source
Security analysis of the micro transport protocol with a misbehaving receiver [PDF]
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP).
Adamsky, F. +3 more
core +1 more source
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI +2 more
core +2 more sources
In this paper, a new method of measurement matrix optimization for compressed sensing based on alternating minimization is introduced. The optimal measurement matrix is formulated in terms of minimizing the Frobenius norm of the difference between the ...
Renjie Yi, Chen Cui, Biao Wu, Yang Gong
doaj +1 more source
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems [PDF]
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the ...
Gadyatskaya, Olga
core +4 more sources
A Method of Constructing Measurement Matrix for Compressed Sensing by Chebyshev Chaotic Sequence
In this paper, the problem of constructing the measurement matrix in compressed sensing is addressed. In compressed sensing, constructing a measurement matrix of good performance and easy hardware implementation is of interest. It has been recently shown
Renjie Yi +3 more
doaj +1 more source
Effects of Sex and Gender on Adaptation to Space: Musculoskeletal Health [PDF]
There is considerable variability among individuals in musculoskeletal response to long-duration spaceflight. The specific origin of the individual variability is unknown but is almost certainly influenced by the details of other mission conditions such ...
Bemben, Debra +5 more
core +2 more sources
This paper addresses the waveform design problem to estimate the target impulse response (TIR) of the temporally correlated extended target in a cognitive radar, subject to a detection constraint and a peak-to-average power ratio constraint.
Tianduo Hao, Chen Cui, Yang Gong
doaj +1 more source
Despite the success of small interfering RNA (siRNA) in clinical settings and its potential value in human immunodeficiency virus (HIV) therapy, the rapid clearance and absence of precise delivery to target cells still hinder the therapeutic effect of ...
Jinbang Zhang +15 more
doaj +1 more source

