Results 91 to 100 of about 9,492,518 (363)
LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency than legacy cellular networks.
Limei He +2 more
semanticscholar +1 more source
3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht +5 more
wiley +1 more source
Graph Representation Learning for Street-Level Crime Prediction
In contemporary research, the street network emerges as a prominent and recurring theme in crime prediction studies. Meanwhile, graph representation learning shows considerable success, which motivates us to apply the methodology to crime prediction ...
Haishuo Gu, Jinguang Sui, Peng Chen
doaj +1 more source
Application of Data Encryption Technology in Computer Network Security
With the development of information technology, the problem of computer network security is becoming more and more prominent. Illegal invasion, information disclosure, virus impact and network vulnerability are all factors that affect computer network ...
Weilian. Chu
semanticscholar +1 more source
Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir +8 more
wiley +1 more source
Resource allocation for spectrum-leasing based CRN with delay-sensitive traffic
In this paper, cooperative resource allocation strategies are characterized for a spectrum-leasing based cognitive radio network (CRN), where the primary system leases the licensed band to the secondary system for a fraction of time in exchange for the ...
Yanbo Ma, Xiao Yin, Xiao Yang, Qiang Liu
doaj +1 more source
Performance analysis of a security architecture for active networks in Java [PDF]
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo +3 more
core +2 more sources
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
IPv6-Based Architecture of Community Medical Internet of Things
The effective integration of Community Medical Internet of Things (CMIoT) and the core technology IPv6 about the next generation of Internet will create a new pattern for the medical field.
Chao Liu +5 more
doaj +1 more source
Efficient Wireless Security Through Jamming, Coding and Routing
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa +3 more
core +1 more source

