Results 41 to 50 of about 1,340 (116)

Rethinking Novelty in Patent Law [PDF]

open access: yes, 2011
The novelty requirement seeks to ensure that a patent will not issue if the public already possesses the invention. Although gauging possession is usually straightforward for simple inventions, it can be difficult for those in complex fields like ...
Seymore, Sean B.
core   +3 more sources

Lightweight IoT security middleware for end-to-end cloud-fog communication [PDF]

open access: yes
Dr. Prasad Calyam, Thesis Supervisor.Field of study: Computer science."May 2017."IoT (Internet of Things) based smart devices such as sensors and wearables have been actively used in edge clouds i.e., 'fogs' to provide critical data during scenarios ...
Mukherjee, Bidyut
core   +1 more source

Patterns of Interploidy Admixture in Polyploid Complexes: Insights From Thymus Sect. Mastichina (Lamiaceae)

open access: yesMolecular Ecology, Volume 35, Issue 3, February 2026.
ABSTRACT Understanding gene flow between ploidy levels in polyploid complexes is essential for species delimitation and conservation. This study explores evolutionary dynamics in the polyploid complex Thymus sect. Mastichina (Lamiaceae), comprising three taxa: T. mastichina subsp. mastichina, T. mastichina subsp.
Francisco José García‐Cárdenas   +7 more
wiley   +1 more source

Resource allocation and feedback in wireless multiuser networks [PDF]

open access: yes, 2014
This thesis focuses on the design of algorithms for resource allocation and feedback in wireless multiuser and heterogeneous networks. In particular, three key design challenges expected to have a major impact on future wireless networks are considered ...
Boerman, M.P.   +4 more
core   +3 more sources

Toward Integrative Predictive Toxicology: Advanced Methods for Drug Toxicity and Safety Prediction

open access: yesWIREs Computational Molecular Science, Volume 16, Issue 1, January/February 2026.
This figure summarizes the different methods in integrative predictive toxicology reviewed in this work, ranging from exploration of molecular mechanisms to in silico pharmacokinetic modeling and construction of adverse outcome pathway (AOP) networks based on key events (KEs) and key event relationships (KERs). Further integration with multi‐omics data
Eleonora Gianquinto   +6 more
wiley   +1 more source

A Comparative Benchmark of Large Language Models for Labelling Wind Turbine Maintenance Logs

open access: yesIET Renewable Power Generation, Volume 20, Issue 1, January/December 2026.
This paper presents a novel, open‐source framework for benchmarking large language models to classify unstructured wind turbine maintenance logs, a significant barrier to automated reliability analysis. Our systematic evaluation of leading models quantifies a clear performance hierarchy and finds that model calibration is a critical differentiator for ...
Max Malyi   +3 more
wiley   +1 more source

Power Allocation for Secure NOMA Network Based on Q-Learning

open access: yesIEEE Access
This paper investigates the secrecy performance of a multi-relay non-orthogonal multiple access (NOMA) network. Considering the presence of eavesdroppers, an optimal relay selection scheme and a jamming signal transmission scheme for both amplify-and ...
Weidong Guo, Xinyan Wang
doaj   +1 more source

CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines [PDF]

open access: yes, 2007
Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to ...
Boujemaa, Nozha   +13 more
core   +1 more source

Advanced AI‐Based Energy Efficiency and Network Performance Optimization in Next‐Generation Wireless Systems Using Distributed Collective Intelligence

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
This paper proposes a new framework combining distributed collective intelligence and deep neural networks (DNNs) for multiobjective optimization in wireless systems of future generation. This paper mitigates some of those disadvantages by proposing a distributed consensus algorithm that incorporates predictive energy allocation and power‐based ...
Mohammed Aboud Kadhim   +3 more
wiley   +1 more source

Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies

open access: yesPhotonics
In this paper, we analyze the confidentiality of a hybrid radio frequency (RF)/free-space optical (FSO) system with regard to physical layer security (PLS). In this system, signals are transmitted between the source and destination using RF and FSO links,
Xinkang Song   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy