Results 71 to 80 of about 1,765,999 (278)

Denial of service attacks and challenges in broadband wireless networks [PDF]

open access: yes, 2008
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN).
Khan, MA, Khan, S, Loo, KK, Naeem, T
core   +1 more source

Photoswitching Conduction in Framework Materials

open access: yesAdvanced Functional Materials, EarlyView.
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez   +4 more
wiley   +1 more source

Graph Representation Learning for Street-Level Crime Prediction

open access: yesISPRS International Journal of Geo-Information
In contemporary research, the street network emerges as a prominent and recurring theme in crime prediction studies. Meanwhile, graph representation learning shows considerable success, which motivates us to apply the methodology to crime prediction ...
Haishuo Gu, Jinguang Sui, Peng Chen
doaj   +1 more source

PEDOT‐Based Eutectogel Electrode Arrays for Enhanced High‐Resolution Electrogastrography: Fabrication, Stability, and Wearable Performance

open access: yesAdvanced Functional Materials, EarlyView.
Here, we present a high‐density PEDOT eutectogel electrode array for enhanced body surface gastric mapping. Silver electrodes are blade‐coated onto flexible substrates, followed by electrogelation of PEDOT:PSS and the deposition of a PEDOT:LS eutectogel.
Christopher Slaughter   +8 more
wiley   +1 more source

Techniques for Enhanced Physical-Layer Security

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao   +2 more
core   +1 more source

Meta‐Rod Mechanical Metamaterials With Programmable Reconfiguration

open access: yesAdvanced Functional Materials, EarlyView.
Existing mechanical metamaterials achieve programmable large deformations in planar square or cubic configurations, restricted by required complex boundary conditions. This research proposes a 1D metamaterial, Meta‐rod, with linear, bending, twisting, area, and volume deformation modes.
Atharva Pande, Lyes Kadem, Hang Xu
wiley   +1 more source

Covalent Organic Frameworks for Photocatalytic CO2 Reduction: Metal Integration Principles, Strategies and Functions

open access: yesAdvanced Functional Materials, EarlyView.
Covalent organic frameworks (COFs) with metals have been recognized as versatile platforms for photocatalytic CO2 reduction (CO2PRR). Herein, an overview of metal integration strategies for COFs is systematically summarized. Regulatory mechanisms and structure–activity relationships between metal integration and COF‐based CO2PRR are emphasized.
Jie He   +5 more
wiley   +1 more source

Resource allocation for spectrum-leasing based CRN with delay-sensitive traffic

open access: yesEURASIP Journal on Wireless Communications and Networking, 2017
In this paper, cooperative resource allocation strategies are characterized for a spectrum-leasing based cognitive radio network (CRN), where the primary system leases the licensed band to the secondary system for a fraction of time in exchange for the ...
Yanbo Ma, Xiao Yin, Xiao Yang, Qiang Liu
doaj   +1 more source

Security models for trusting network appliances [PDF]

open access: yes, 2002
A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment.
English, Colin   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy