Results 41 to 50 of about 5,515,542 (307)

Energy-Efficient Resource Allocation for Device-to-Device Underlay Communication

open access: yes, 2014
Device-to-device (D2D) communication underlaying cellular networks is expected to bring significant benefits for utilizing resources, improving user throughput and extending battery life of user equipments.
Han, Zhu   +3 more
core   +1 more source

Lifestyle Behaviors and Cardiotoxic Treatment Risks in Adult Childhood Cancer Survivors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Higher doses of anthracyclines and heart‐relevant radiotherapy increase cardiovascular disease (CVD) risk. This study assessed CVD and CVD risk factors among adult childhood cancer survivors (CCSs) across cardiotoxic treatment risk groups and examined associations between lifestyle behaviors and treatment risks.
Ruijie Li   +6 more
wiley   +1 more source

A Novel Device-to-Device Discovery Scheme for Underlay Cellular Networks

open access: yes, 2017
Tremendous growing demand for high data rate services such as video, gaming and social networking in wireless cellular systems, attracted researchers' attention to focus on developing proximity services.
Ghorashi, Seyed Ali   +2 more
core   +1 more source

Artificial intelligence-driven phase recognition in lung surgery: a single-centre pilot study☆

open access: yesESMO Real World Data and Digital Oncology
Introduction: Effective surgical specimen management during lung resection is crucial for accurate analyses and treatment. Minimally invasive techniques complicate workflows; thus, artificial intelligence (AI)-based solutions are needed to improve their ...
S.J.-Y. Ohtani-Kim   +15 more
doaj   +1 more source

A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things

open access: yesIEEE Access, 2021
The Internet of Things (IoT) is a heterogeneous environment that connects billions of devices. Thus, it is a significantly high-value target for attackers and suffers from several threats, especially impersonation attacks during the session.
Arwa Badhib   +2 more
doaj   +1 more source

Game-theoretic resource allocation methods for device-to-device communication [PDF]

open access: yesIEEE wireless communications, 2014
Device-to-device communication underlaying cellular networks allows mobile devices such as smartphones and tablets to use the licensed spectrum allocated to cellular services for direct peer-to-peer transmission.
Lingyang Song   +3 more
semanticscholar   +1 more source

Changes in Body Composition in Children and Young People Undergoing Treatment for Acute Lymphoblastic Leukemia: A Systematic Review and Meta‐Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed   +5 more
wiley   +1 more source

Optimizing The Spatial Content Caching Distribution for Device-to-Device Communications

open access: yes, 2016
We study the optimal geographic content placement problem for device-to-device (D2D) networks in which the content popularity follows the Zipf law. We consider a D2D caching model where the locations of the D2D users (caches) are modeled by a Poisson ...
Al-Shalash, Mazin   +2 more
core   +1 more source

Multidimensional morphological analysis of live sperm based on multiple-target tracking

open access: yesComputational and Structural Biotechnology Journal
Manual semen evaluation methods are subjective and time-consuming. In this study, a deep learning algorithmic framework was designed to enable non-invasive multidimensional morphological analysis of live sperm in motion, improve current clinical sperm ...
Hao Yang   +19 more
doaj   +1 more source

Smart Technique for Cache-Assisted Device to Device Communications

open access: yesIEEE Access, 2020
The emergence of smart terminals with the consequence of higher network traffic growth rates, has increased the demand for new techniques that are needed to meet user requirements for high-quality communication and social media services.
Ahmed Hassan Abdel Salam   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy