Results 41 to 50 of about 4,484,297 (341)

Survey on Mobile Cloud Computing

open access: yesAdvances in Robotic Technology
The paper explores how cloud computing offers the capacity to improve computing features and application services while addressing its transformative impact on mobile device systems.
Jain R
semanticscholar   +1 more source

Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination

open access: yesJournal of Information Security and Cybercrimes Research, 2019
In this paper, we propose a modification for security authentication systems in mobile devices. Our enhancement is designed to secure information transformation over the internet by combining hash, cryptography and steganography mechanisms.
Muneera Alotaibi   +4 more
semanticscholar   +1 more source

High-fidelity point cloud completion with low-resolution recovery and noise-aware upsampling

open access: yesGraphical Models, 2023
Completing an unordered partial point cloud is a challenging task. Existing approaches that rely on decoding a latent feature to recover the complete shape, often lead to the completed point cloud being over-smoothing, losing details, and noisy.
Ren-Wu Li   +4 more
doaj  

A Centralized and Dynamic Network Congestion Classification Approach for Heterogeneous Vehicular Networks

open access: yesIEEE Access, 2021
Network congestion-related studies consist mainly of two parts: congestion detection and congestion control. Several researchers have proposed different mechanisms to control congestion and used channel loads or other factors to detect congestion ...
Farnoush Falahatraftar   +2 more
doaj   +1 more source

A Conditional Generative Adversarial Network Based Approach for Network Slicing in Heterogeneous Vehicular Networks

open access: yesTelecom, 2021
Heterogeneous Vehicular Network (HetVNET) is a highly dynamic type of network that changes very quickly. Regarding this feature of HetVNETs and the emerging notion of network slicing in 5G technology, we propose a hybrid intelligent Software-Defined ...
Farnoush Falahatraftar   +2 more
doaj   +1 more source

Smooth Autonomous Patrolling for a Differential-Drive Mobile Robot in Dynamic Environments

open access: yesSensors, 2023
Today, mobile robots have a wide range of real-world applications where they can replace or assist humans in many tasks, such as search and rescue, surveillance, patrolling, inspection, environmental monitoring, etc.
Ana Šelek, Marija Seder, Ivan Petrović
doaj   +1 more source

Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer

open access: yesMolecular Oncology, EarlyView.
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu   +7 more
wiley   +1 more source

MET variants with activating N‐lobe mutations identified in hereditary papillary renal cell carcinomas still require ligand stimulation

open access: yesMolecular Oncology, EarlyView.
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin   +14 more
wiley   +1 more source

Exploring Observability of Attractor Cycles in Boolean Networks for Biomarker Detection

open access: yesIEEE Access, 2019
Boolean Network (BN) is a simple and popular mathematical model that has attracted significant attention from systems biology due to its capacity to reveal genetic regulatory network behavior.
Yushan Qiu   +7 more
doaj   +1 more source

A Client/Server Malware Detection Model Based on Machine Learning for Android Devices

open access: yesIoT, 2021
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices.
Arthur Fournier   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy