Results 101 to 110 of about 1,786,070 (326)
Efficient Wireless Security Through Jamming, Coding and Routing
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa +3 more
core +1 more source
A 3D bone scaffold with osteogenic properties and capable of hardening in vivo is developed. The scaffold is implanted in a ductile state, and a phase transformation of the ceramic induces the stiffening and strengthening of the scaffold in vivo. Abstract Calcium phosphate 3D printing has revolutionized customized bone grafting.
Miguel Mateu‐Sanz +7 more
wiley +1 more source
Application-centric congestion control
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer +3 more
doaj +1 more source
Automatic analysis of alarm embedded with large language model in police robot
Police robots are used to assist police officers in performing tasks in complex environments, so as to improve the efficiency of law enforcement, ensure the safety of police officers and maintain social stability.
Zirui Liu, Haichun Sun, Deyu Yuan
doaj +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source
This study presents the BioCLEAR system, a highly transparent and conductive neural electrode array composed of silver nanowires (AgNWs) and doped PEDOT:PSS, enabling neural recordings with minimal optical artifacts. When integrated with a GRIN lens, this cost‐effective neural implant allows simultaneous electrophysiological recording and GCaMP6‐based ...
Dongjun Han +17 more
wiley +1 more source
With the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools.
Joaquín Gaspar Medina-Arco +3 more
doaj +1 more source
A feature selection method of network traffic based on statistic and ranking strategy
It is required to select the best features from so many ones in order to avoid the high complexity of the model, the low classification accuracy and efficiency caused by redundant and irrelevant features, if network traffic classification is obtained by ...
Liu Jiwei, Zhao Yuexian, Zhao Yang
doaj +1 more source
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest
A Armando +13 more
core +1 more source

