Results 41 to 50 of about 16,642 (207)

Secure Full-Duplex Device-to-Device Communication [PDF]

open access: yes, 2017
This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers.
Khandaker, Muhammad R. A.   +2 more
core   +3 more sources

Device-to-Device (D2D) Communication as a Bootstrapping System in a Wireless Cellular Network

open access: yesIEEE Access, 2019
Device-to-Device (D2D) communication is considered to be a promising form of technology to distribute video contents to nearby users and devices at a high data rate and with few delays.
Nasreen Anjum   +4 more
semanticscholar   +1 more source

Toward Capacitive In‐Memory‐Computing: A Device to Systems Level Perspective on the Future of Artificial Intelligence Hardware

open access: yesAdvanced Intelligent Discovery, EarlyView.
Capacitive, charge‐domain compute‐in‐memory (CIM) stores weights as capacitance,eliminating DC sneak paths and IR‐drop, yielding near‐zero standbypower. In this perspective, we present a device to systems level performance analysis of most promising architectures and predict apathway for upscaling capacitive CIM for sustainable edge computing ...
Kapil Bhardwaj   +2 more
wiley   +1 more source

Advancing Organic Chemistry Using High‐Throughput Experimentation

open access: yesAngewandte Chemie, Volume 137, Issue 40, September 26, 2025.
This review outlines major advances in the design, execution, analysis, and data management phases of high‐throughput experimentation (HTE). The limitations and potential opportunities of applying modern HTE to organic synthesis are highlighted. Abstract High‐throughput experimentation (HTE), the miniaturization and parallelization of reactions, is a ...
Reem Nsouli   +2 more
wiley   +2 more sources

Enabling D2D Transmission Mode with Energy Harvesting and Information Transfer in Heterogeneous Networks

open access: yesAdvances in Electrical and Electronic Engineering, 2018
The concept of energy harvesting-assisted relay has been introduced to support the relaying transmission using Device-to-Device (D2D) communications for enhancing communication reliability. Motivated by the recent advance in Heterogeneous Network (HetNet)
Hong Nhu Nguyen   +6 more
doaj   +1 more source

Wireless powered D2D communications underlying cellular networks: design and performance of the extended coverage [PDF]

open access: yes, 2017
Because of the short battery life of user equipments (UEs), and the requirements for better quality of service have been more demanding, energy efficiency (EE) has emerged to be important in device-to-device (D2D) communications.
Nguyen, Hoang-Sy   +2 more
core   +2 more sources

Gradual volatile memristor–based artificial neurons with high uniformity for neuromorphic computing

open access: yesInfoScience, EarlyView.
Schematic of leaky integrate‐and‐fire artificial neurons for MNIST image classification. Abstract Artificial neurons are pivotal for neuromorphic hardware, but the development of compact and uniform devices remains challenging. Conventional volatile memristors suffer from abrupt switching, which hinders spatiotemporal consistency.
Pengtao Li   +12 more
wiley   +1 more source

Energy-Efficient Resource and Power Allocation for Underlay Multicast Device-to-Device Transmission

open access: yesFuture Internet, 2017
In this paper, we present an energy-efficient resource allocation and power control scheme for D2D (Device-to-Device) multicasting transmission. The objective is to maximize the overall energy-efficiency of D2D multicast clusters through effective ...
Fan Jiang   +3 more
doaj   +1 more source

A Two‐Phase Detection Method Based on Ensemble Feature Fusion for Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Using Deep Learning Algorithm

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein   +3 more
wiley   +1 more source

Survey of software defined D2D and V2X communication

open access: yesTongxin xuebao, 2019
The related D2D (device-to-device) and V2X (vehicle-to-everything) are regarded as vital components of 5G communication system,which providing alternative network services and multiple application services for cellular network.In the meanwhile,SDN ...
Wenjuan SHAO, Qingguo SHEN
doaj   +2 more sources

Home - About - Disclaimer - Privacy