Results 41 to 50 of about 1,340 (116)
Rethinking Novelty in Patent Law [PDF]
The novelty requirement seeks to ensure that a patent will not issue if the public already possesses the invention. Although gauging possession is usually straightforward for simple inventions, it can be difficult for those in complex fields like ...
Seymore, Sean B.
core +3 more sources
Lightweight IoT security middleware for end-to-end cloud-fog communication [PDF]
Dr. Prasad Calyam, Thesis Supervisor.Field of study: Computer science."May 2017."IoT (Internet of Things) based smart devices such as sensors and wearables have been actively used in edge clouds i.e., 'fogs' to provide critical data during scenarios ...
Mukherjee, Bidyut
core +1 more source
ABSTRACT Understanding gene flow between ploidy levels in polyploid complexes is essential for species delimitation and conservation. This study explores evolutionary dynamics in the polyploid complex Thymus sect. Mastichina (Lamiaceae), comprising three taxa: T. mastichina subsp. mastichina, T. mastichina subsp.
Francisco José García‐Cárdenas +7 more
wiley +1 more source
Resource allocation and feedback in wireless multiuser networks [PDF]
This thesis focuses on the design of algorithms for resource allocation and feedback in wireless multiuser and heterogeneous networks. In particular, three key design challenges expected to have a major impact on future wireless networks are considered ...
Boerman, M.P. +4 more
core +3 more sources
Toward Integrative Predictive Toxicology: Advanced Methods for Drug Toxicity and Safety Prediction
This figure summarizes the different methods in integrative predictive toxicology reviewed in this work, ranging from exploration of molecular mechanisms to in silico pharmacokinetic modeling and construction of adverse outcome pathway (AOP) networks based on key events (KEs) and key event relationships (KERs). Further integration with multi‐omics data
Eleonora Gianquinto +6 more
wiley +1 more source
A Comparative Benchmark of Large Language Models for Labelling Wind Turbine Maintenance Logs
This paper presents a novel, open‐source framework for benchmarking large language models to classify unstructured wind turbine maintenance logs, a significant barrier to automated reliability analysis. Our systematic evaluation of leading models quantifies a clear performance hierarchy and finds that model calibration is a critical differentiator for ...
Max Malyi +3 more
wiley +1 more source
Power Allocation for Secure NOMA Network Based on Q-Learning
This paper investigates the secrecy performance of a multi-relay non-orthogonal multiple access (NOMA) network. Considering the presence of eavesdroppers, an optimal relay selection scheme and a jamming signal transmission scheme for both amplify-and ...
Weidong Guo, Xinyan Wang
doaj +1 more source
CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines [PDF]
Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to ...
Boujemaa, Nozha +13 more
core +1 more source
This paper proposes a new framework combining distributed collective intelligence and deep neural networks (DNNs) for multiobjective optimization in wireless systems of future generation. This paper mitigates some of those disadvantages by proposing a distributed consensus algorithm that incorporates predictive energy allocation and power‐based ...
Mohammed Aboud Kadhim +3 more
wiley +1 more source
Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies
In this paper, we analyze the confidentiality of a hybrid radio frequency (RF)/free-space optical (FSO) system with regard to physical layer security (PLS). In this system, signals are transmitted between the source and destination using RF and FSO links,
Xinkang Song +4 more
doaj +1 more source

