Results 91 to 100 of about 9,492,518 (363)

LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey

open access: yesIEEE Access, 2018
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency than legacy cellular networks.
Limei He   +2 more
semanticscholar   +1 more source

3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht   +5 more
wiley   +1 more source

Graph Representation Learning for Street-Level Crime Prediction

open access: yesISPRS International Journal of Geo-Information
In contemporary research, the street network emerges as a prominent and recurring theme in crime prediction studies. Meanwhile, graph representation learning shows considerable success, which motivates us to apply the methodology to crime prediction ...
Haishuo Gu, Jinguang Sui, Peng Chen
doaj   +1 more source

Application of Data Encryption Technology in Computer Network Security

open access: yesJournal of Physics: Conference Series, 2019
With the development of information technology, the problem of computer network security is becoming more and more prominent. Illegal invasion, information disclosure, virus impact and network vulnerability are all factors that affect computer network ...
Weilian. Chu
semanticscholar   +1 more source

Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir   +8 more
wiley   +1 more source

Resource allocation for spectrum-leasing based CRN with delay-sensitive traffic

open access: yesEURASIP Journal on Wireless Communications and Networking, 2017
In this paper, cooperative resource allocation strategies are characterized for a spectrum-leasing based cognitive radio network (CRN), where the primary system leases the licensed band to the secondary system for a fraction of time in exchange for the ...
Yanbo Ma, Xiao Yin, Xiao Yang, Qiang Liu
doaj   +1 more source

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

IPv6-Based Architecture of Community Medical Internet of Things

open access: yesIEEE Access, 2018
The effective integration of Community Medical Internet of Things (CMIoT) and the core technology IPv6 about the next generation of Internet will create a new pattern for the medical field.
Chao Liu   +5 more
doaj   +1 more source

Efficient Wireless Security Through Jamming, Coding and Routing

open access: yes, 2013
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy