Results 141 to 150 of about 194,259 (259)

Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access

open access: yesSensors
With the advent of 6G Narrowband IoT (NB-IoT) technology, IoT security faces inevitable challenges due to the application requirements of Massive Machine-Type Communications (mMTCs).
Wen-Chung Tsai
doaj   +1 more source

Make Social Media Social Again: How Platform Interoperability Can Fix Social Media and Future‐Proof Democracy

open access: yesJournal of Management Studies, EarlyView.
Abstract This essay argues that social media document (rather than fuel) the decline of political democracy while helping revive organizational democracy, including through ‘decentralized autonomous organizations’ (DAOs). Yet, despite giving everyone a voice and the ability to organize across borders, social media could over‐concentrate power if, in ...
J.P. Vergne
wiley   +1 more source

On the Application of Massive MIMO Systems to Machine Type Communications

open access: green, 2018
Felipe A. P. de Figueiredo   +3 more
openalex   +2 more sources

Co‐Design at the Boundary: Understanding the Dynamics of Open Innovation Between Companies and Communities

open access: yesJournal of Product Innovation Management, EarlyView.
ABSTRACT For over two decades, firms have built platforms and engaged open innovation communities to improve and customize their products through widened participation in the design process. While the benefits of involving those outside a firm as co‐designers have been well described, how co‐design processes unfold over time at the boundary between ...
Eric Reynolds Brubaker   +3 more
wiley   +1 more source

Autoimmunity and Periodontitis

open access: yesJournal of Periodontal Research, EarlyView.
In a microbe‐driven inflammatory environment, peptidyl‐arginine deiminase (PAD) enzymes from neutrophils and Porphyromonas gingivalis citrullinate both microbial and self‐antigens. B cell presentation of citrullinated or self‐mimicking epitopes activates T cells that assist B cells in antibody isotype switching, affinity maturation, epitope spreading ...
Massimo Costalonga   +2 more
wiley   +1 more source

The Impacts of Weather Variability and Shocks on Farmers and Indigenous Peoples' Consumption: Evidence From Panama

open access: yesReview of Development Economics, EarlyView.
ABSTRACT Weather variability and shocks pose significant challenges for tropical developing countries, making it crucial to understand their effects on consumption to address the existing deficiencies among the most vulnerable groups. This study examines the impact of weather variability and shocks on household consumption in Panama, utilizing repeated
Ambar Lineth Chavez Espinosa   +1 more
wiley   +1 more source

Random access scheme for different MTC scenario requirement

open access: yesTongxin xuebao, 2020
For the different random access requirements of the mixed scenarios of ultra-reliable low latency (URLLC) and massive machine type communications (mMTC) in MTC,a random access scheme based on devices grouping was proposed.The proposed scheme divided the ...
Zhefu WU   +3 more
doaj  

Alternation of must, have to, and need to in English as a lingua franca

open access: yesWorld Englishes, EarlyView.
Abstract This study explores the grammatical variability of modal auxiliary verbs in English as a lingua franca. Focusing on the ongoing change must, have to, and need to, this research utilizes two spoken corpora: the Vienna–Oxford International Corpus of English (VOICE) and the Asian Corpus of English (ACE).
Chunyuan Nie   +2 more
wiley   +1 more source

Joint Activity Detection and Channel Estimation for Clustered Massive Machine Type Communications [PDF]

open access: green, 2023
Leatile Marata   +4 more
openalex   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy