Results 91 to 100 of about 54,785 (276)
Active Force Dynamics in Red Blood Cells Under Non‐Invasive Optical Tweezers
A non‐invasive method combines low‐power optical tweezers with high‐speed microscopy to simultaneously monitor local membrane forces and displacements in single human red blood cells. This dual‐channel approach reveals a mechano‐dynamic signature that correlates the cell's metabolic state with its mechanical activity. This energetic framework serves as
Arnau Dorn +5 more
wiley +1 more source
Experimental Evaluation of Network-Controlled Physical-Layer Security Through Friendly Jamming
In this paper, we present a real-life, cost-effective implementation of physical layer security (PLS) using friendly jamming (FJ) and the IEEE 802.11 technology.
Sayed Amir Hoseini +4 more
doaj +1 more source
Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks
We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends $K$ confidential information signals to $K$ legitimate users (Bobs) in the presence of $L$ eavesdroppers (Eves).
Akgun, Berk +2 more
core +1 more source
The functional schematic diagram of tumor associated neutrophils. Abstract Enhancing cervical cancer (CC) immunotherapy requires deciphering the heterogeneous tumor immune microenvironment (TIME), particularly neutrophil phenotypic dynamics. Here, 1) we collected 543 CC cases to find that patients with elevated neutrophil levels have a higher incidence
Xingyu Chang +7 more
wiley +1 more source
Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers
Integrating unmanned aerial vehicles (UAVs) with wireless systems is widely anticipated to bring enormous benefits to network users, and is considered as a key enabling technology for next generation wireless networks.
Gongchao Su +3 more
doaj +1 more source
Securing UAV Communications Via Trajectory Optimization
Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due to many advantages such as low cost, high mobility, and on-demand deployment. This paper addresses the issue of physical-layer security in a UAV communication system,
Cui, Miao +3 more
core +1 more source
This study identifies ESM1 as an endogenous anticoagulant that modulates venous thrombosis. It shows that ESM1 deficiency triggers vascular occlusion in zebrafish and mice, whereas its restoration or overexpression prolongs clot‐formation time. Mechanistic analyses reveal that ESM1 activates HCII through its dermatan‐sulfate chain, uncovering a ...
Changsheng Chen +10 more
wiley +1 more source
Power Allocation for Secure NOMA Network Based on Q-Learning
This paper investigates the secrecy performance of a multi-relay non-orthogonal multiple access (NOMA) network. Considering the presence of eavesdroppers, an optimal relay selection scheme and a jamming signal transmission scheme for both amplify-and ...
Weidong Guo, Xinyan Wang
doaj +1 more source
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos +3 more
core +1 more source
This study identifies TOPK as a dual‐function target in gastric cancer: it drives tumor cell proliferation and migration, and under IFN‐γ stimulation, phosphorylates eIF4F complex component eIF4A1 to enhance STAT1 mRNA translation, thereby promoting PD‐L1/IDO1‐mediated tumor immunometabolic evasion.
Junbing Chen +16 more
wiley +1 more source

