Results 41 to 50 of about 2,320 (256)
Sleep Alters the Velocity of Physiological Brain Pulsations in Humans
Sleep alters I/CSF oscillatory flow, driven by increased respiratory (29%) and vasomotor pulsation (21%) velocities, while cardiovascular pulsations decreased by (22%). Velocity is quantified using optical flow analysis of MREG data. Spectral power increases alongside these pulsations (spatial correlation, r = 0.35 and r = 0.39, respectively ...
Ahmed Elabasy +13 more
wiley +1 more source
Secure On-Off Transmission in UAV Relay-Assisted mmWave Networks
This paper investigates secure transmission in unmanned aerial vehicle (UAV) relay-assisted millimeter wave (mmWave) networks, where the selected UAV relay performs secure transmission in both the on-off and non-on-off schemes.
Ruiqian Ma +3 more
doaj +1 more source
HSP90α is significantly upregulated in platelets from sepsis patients, with its origin from megakaryocyte‐derived trafficking. Furthermore, activated platelets secrete HSP90α into the extracellular space in both free and exosome‐associated forms. Finally, extracellular HSP90α directly engages TLR4 on neutrophils to induce autophagy, leading to NET ...
Chengbo Wang +17 more
wiley +1 more source
Analysis and improvement of an ID-based authenticated key agreement protocol
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it ...
WANG Xiao-fen1 +2 more
doaj +2 more sources
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two technologies witnessed to offer tremendous possibilities for the next generation wireless networks to maximise their usage of available spectrum.
Kiran Kumar Godugu, Suseela Vappangi
doaj +1 more source
PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL [PDF]
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical ...
Vaibhav Kumar Gupta, Poonam Jindal
doaj
Climate change reshapes the spatial alignment between crop production and environmental resources. Using multi‐source data and a crop model, integrated climatic, water, and soil endowments for maize and wheat are quantified and compared with harvest distributions.
Zheng'e Su +13 more
wiley +1 more source
UAV-Aided Secure Transmission in MISOME Wiretap Channels With Imperfect CSI
In this paper, we study secure cooperative transmission for the multiple-input-single-output multiple-eavesdropper (MISOME) systems, where a source (Alice) aims to send confidential messages to a legitimate user (Bob) with the aid of an unmanned aerial ...
Yang Chen, Zhongpei Zhang
doaj +1 more source
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
Smart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart ...
Qi Xie +5 more
doaj +1 more source

