Authentication mechanism based on distributed blockchain for secure and energy efficient mobile ad-hoc networks. [PDF]
Sugumaran VR +3 more
europepmc +1 more source
WS2‐based in‐memory sensing reservoir computing integrates sensing, memory, and computation in one compact device. It achieves ∼94% N‐MNIST, ∼93% eye motion perception, and ∼89% speech recognition with ultra‐low energy (∼25.5 fJ/spike). The system shows stability at 95% humidity, endurance over 1.5M cycles, and supports synaptic plasticity, enabling ...
Dayanand Kumar +9 more
wiley +1 more source
An efficient framework for scheduling security-critical tasks in resource-limited mobile edge computing using hybridized gold rush with golden jackal optimization strategy. [PDF]
Vhatkar K +7 more
europepmc +1 more source
Digital Health in Pediatric Oncology and Hematooncology: A Quasi-Systematic Review of Telehealth, mHealth and Precision Medicine. [PDF]
Ziętara KJ +4 more
europepmc +1 more source
AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source
Three-Basis Loop-Back QKD: A Passive Architecture for Secure and Scalable Quantum Mobile Networks. [PDF]
Lizama-Pérez LA, Morales-Calvo P.
europepmc +1 more source
Mobile-Based Medication Management Applications: A Scoping Review of Functional and Non-Functional Requirements. [PDF]
Malekzadeh S, Ayatollahi H, Toni E.
europepmc +1 more source
Acoustic sentinel: hierarchical classification of footstep sound using fine and coarse-grain acoustic feature representations for tactical surveillance. [PDF]
Agrahri A +3 more
europepmc +1 more source
Patient Perceptions of Blockchain-Based Health Information Exchange: User-Centered Design Study.
Guse R +7 more
europepmc +1 more source

