Results 61 to 70 of about 54,785 (276)

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Maximum Secrecy Throughput Analysis of Practical RIS-Aided mmWave Systems Over Unified FTR/IFTR Fading Channels

open access: yesIEEE Transactions on Wireless Communications
In this paper, we consider a millimeter-wave (mmWave) wiretap scenario where a multiple-antenna base station (Alice) communicates with a legitimate user (Bob) via a reconfigurable intelligent surface (RIS) amid multiple colluding eavesdroppers (Eves ...
Phuc V. Trinh, S. Sugiura
semanticscholar   +1 more source

Mesenchymal Stem Cell‐Derived Apoptotic Micro‐Vesicles Repaired Sciatic Nerve Defect by Regulating Early Inflammatory Microenvironment and Promoting Angiogenesis

open access: yesAdvanced Healthcare Materials, EarlyView.
HUCMSC‐Apo‐mvs enhance peripheral nerve repair by modulating the inflammatory microenvironment (IME), primarily through coordinated actions on three functional cells. They recruit macrophages and promote their polarization from pro‐inflammatory M1 to anti‐inflammatory M2 phenotypes, increasing secretion of IL‐10 and VEGF.
Haolin Liu   +21 more
wiley   +1 more source

On Effective Secrecy Throughput of Underlay Spectrum Sharing $\alpha$-$\mu$/ M\'alaga Hybrid Model under Interference-and-Transmit Power Constraints

open access: yes, 2021
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes
Ibrahim, Md.   +4 more
openaire   +1 more source

Kidney Organoids in Drug Development: Integrating Technological Advances and Standardization for Effective Implementation

open access: yesAdvanced Healthcare Materials, EarlyView.
This review examines how emerging enabling technologies enhance the physiological relevance, scalability, and reproducibility of kidney organoids, while advanced analytical approaches support model validation and deepen mechanistic insight into nephrotoxicity.
Helen Kearney   +3 more
wiley   +1 more source

Performance enhancement solutions in wireless communication networks [PDF]

open access: yes, 2019
In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses ...
Huynh Tan, Phuoc
core  

Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise

open access: yes, 2016
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper.
Bhargava, Vijay K.   +2 more
core   +1 more source

Engineered ETS1‐Nanoconjugate Restores Immune Homeostasis through Dual Immune‐Vascular Modulation in Relapsing and Progressive Multiple Sclerosis

open access: yesAdvanced Healthcare Materials, EarlyView.
The biomimetic nanoplatform IMNP (ETS1 pDNA/PBAE@ITP‐MM) undergoes targeted disassembly at inflammatory vascular sites to release the ETS1 plasmid (pETS1). This release initiates a cascade of effects that inhibit pathogenic pathways and support immune homeostasis. (Abbreviations: EndMT, endothelial‐to‐mesenchymal transition; EC, endothelial cell; TC, T
Feng Zhang   +13 more
wiley   +1 more source

Physical Layer Security in Cognitive Untrusted Relay Networks

open access: yesIEEE Access, 2018
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link ...
Dechuan Chen   +4 more
doaj   +1 more source

Wireless Powered Communication: Opportunities and Challenges

open access: yes, 2014
The performance of wireless communication is fundamentally constrained by the limited battery life of wireless devices, whose operations are frequently disrupted due to the need of manual battery replacement/recharging.
Bi, Suzhi, Ho, Chin Keong, Zhang, Rui
core   +1 more source

Home - About - Disclaimer - Privacy