Results 31 to 40 of about 911,528 (286)

Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems [PDF]

open access: yes, 2020
This paper proposes a low-latency secure mobile edge computing (MEC) system where multiple users offload computing tasks to a base station in the presence of an eavesdropper.
Elkashlan, Maged   +7 more
core   +2 more sources

Impossible Differential Cryptanalysis of GRANULE Algorithm [PDF]

open access: yesJisuanji gongcheng, 2019
The GRANULE algorithm is an ultra-lightweight block cipher algorithm with good hardware and software implementation performance,but now the algorithm lacks security estimation result under impossible differential analysis.Therefore,using middle error ...
SHI Shuying, HE Jun
doaj   +1 more source

A simulated study on intermittent flame feature of mass fire in channel structure

open access: yesCase Studies in Thermal Engineering, 2022
Compared with the intermittent thermal-flame behavior in ordinary building, the flame behavior may also occur in mass fire inside channel structures, accompanied by distinct thermal characteristics, which is rarely studied.
Xi Zhang, Qing Lai, Huang Xiao, Jie Li
doaj   +1 more source

Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers

open access: yesIEEE Access, 2020
With the rapid growth of technology in recent years, we are surrounded by or even dependent on the use of technological devices such as smartphones as they are now an indispensable part of our life.
Majid Hatamian
doaj   +1 more source

Human Autonomy in the Era of Augmented Reality—A Roadmap for Future Work

open access: yesInformation, 2022
Augmented reality (AR) has found application in online games, social media, interior design, and other services since the success of the smartphone game Pokémon Go in 2016.
David Harborth
doaj   +1 more source

Continuous Sliding Mode Control of Robotic Manipulators Based on Time-Varying Disturbance Estimation and Compensation

open access: yesIEEE Access, 2022
To address the high-precision trajectory tracking task of uncertain robotic manipulators, a continuous sliding mode control (CSMC) scheme based on time-varying disturbance estimation and compensation is developed.
Juan Xian   +3 more
doaj   +1 more source

Securing route optimisation in NEMO [PDF]

open access: yes, 2005
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc,and Wireless Networks. 4-6 April 2005. Riva del Garda, Trentino, ItalyThe network mobility (NEMO) basic support protocol enables mobile networks to change their point of ...
Bagnulo Braun, Marcelo Gabriel   +3 more
core   +3 more sources

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Mobile integrated conditional access system [PDF]

open access: yes, 2008
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N   +4 more
core   +1 more source

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals With Type 2 Diabetes

open access: yesArthritis Care &Research, EarlyView.
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy