Results 101 to 110 of about 1,786,070 (326)

Efficient Wireless Security Through Jamming, Coding and Routing

open access: yes, 2013
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa   +3 more
core   +1 more source

Mechanically Tunable Bone Scaffolds: In Vivo Hardening of 3D‐Printed Calcium Phosphate/Polycaprolactone Inks

open access: yesAdvanced Functional Materials, EarlyView.
A 3D bone scaffold with osteogenic properties and capable of hardening in vivo is developed. The scaffold is implanted in a ductile state, and a phase transformation of the ceramic induces the stiffening and strengthening of the scaffold in vivo. Abstract Calcium phosphate 3D printing has revolutionized customized bone grafting.
Miguel Mateu‐Sanz   +7 more
wiley   +1 more source

Application-centric congestion control

open access: yesEURASIP Journal on Wireless Communications and Networking
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer   +3 more
doaj   +1 more source

Automatic analysis of alarm embedded with large language model in police robot

open access: yesBiomimetic Intelligence and Robotics
Police robots are used to assist police officers in performing tasks in complex environments, so as to improve the efficiency of law enforcement, ensure the safety of police officers and maintain social stability.
Zirui Liu, Haichun Sun, Deyu Yuan
doaj   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Transparent Inorganic–Organic Bilayer Neural Electrode Array and Integration to Miniscope System for In Vivo Calcium Imaging and Electrophysiology

open access: yesAdvanced Functional Materials, EarlyView.
This study presents the BioCLEAR system, a highly transparent and conductive neural electrode array composed of silver nanowires (AgNWs) and doped PEDOT:PSS, enabling neural recordings with minimal optical artifacts. When integrated with a GRIN lens, this cost‐effective neural implant allows simultaneous electrophysiological recording and GCaMP6‐based ...
Dongjun Han   +17 more
wiley   +1 more source

Author Correction: Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Yifan Wang   +6 more
doaj   +1 more source

Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems

open access: yesSensors
With the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools.
Joaquín Gaspar Medina-Arco   +3 more
doaj   +1 more source

A feature selection method of network traffic based on statistic and ranking strategy

open access: yesDianzi Jishu Yingyong, 2018
It is required to select the best features from so many ones in order to avoid the high complexity of the model, the low classification accuracy and efficiency caused by redundant and irrelevant features, if network traffic classification is obtained by ...
Liu Jiwei, Zhao Yuexian, Zhao Yang
doaj   +1 more source

Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)

open access: yes, 2014
Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest
A Armando   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy