Results 41 to 50 of about 1,256,284 (285)

Emergency Communications Based on Throughput-Aware D2D Multicasting in 5G Public Safety Networks

open access: yesSensors, 2020
Emergency communications need to meet the developing demand of equipment and the complex scenarios of network in public safety networks (PSNs). Heterogeneous Cloud Radio Access Network (H-CRAN), an important technology of the 5th generation wireless ...
Mengjun Yin   +4 more
doaj   +1 more source

Performance Analysis of Unsupervised LTE Device-to-Device (D2D) Communication

open access: yes, 2018
Cellular network technology based device-to-device communication attracts increasing attention for use cases such as the control of autonomous vehicles on the ground and in the air.
Eckermann, Fabian   +2 more
core   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

Optimizing The Spatial Content Caching Distribution for Device-to-Device Communications

open access: yes, 2016
We study the optimal geographic content placement problem for device-to-device (D2D) networks in which the content popularity follows the Zipf law. We consider a D2D caching model where the locations of the D2D users (caches) are modeled by a Poisson ...
Al-Shalash, Mazin   +2 more
core   +1 more source

Artificial intelligence-driven phase recognition in lung surgery: a single-centre pilot study☆

open access: yesESMO Real World Data and Digital Oncology
Introduction: Effective surgical specimen management during lung resection is crucial for accurate analyses and treatment. Minimally invasive techniques complicate workflows; thus, artificial intelligence (AI)-based solutions are needed to improve their ...
S.J.-Y. Ohtani-Kim   +15 more
doaj   +1 more source

A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things

open access: yesIEEE Access, 2021
The Internet of Things (IoT) is a heterogeneous environment that connects billions of devices. Thus, it is a significantly high-value target for attackers and suffers from several threats, especially impersonation attacks during the session.
Arwa Badhib   +2 more
doaj   +1 more source

Survival Outcomes and Complications Among Canadian Children With Retinoblastoma: A Population‐Based Report From CYP‐C

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine   +14 more
wiley   +1 more source

On Fundamental Trade-offs of Device-to-Device Communications in Large Wireless Networks [PDF]

open access: yes, 2015
This paper studies the gains, in terms of served requests, attainable through out-of-band device-to-device (D2D) video exchanges in large cellular networks.
Altieri, Andrés   +3 more
core   +5 more sources

Multidimensional morphological analysis of live sperm based on multiple-target tracking

open access: yesComputational and Structural Biotechnology Journal
Manual semen evaluation methods are subjective and time-consuming. In this study, a deep learning algorithmic framework was designed to enable non-invasive multidimensional morphological analysis of live sperm in motion, improve current clinical sperm ...
Hao Yang   +19 more
doaj   +1 more source

Smart Technique for Cache-Assisted Device to Device Communications

open access: yesIEEE Access, 2020
The emergence of smart terminals with the consequence of higher network traffic growth rates, has increased the demand for new techniques that are needed to meet user requirements for high-quality communication and social media services.
Ahmed Hassan Abdel Salam   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy