Results 41 to 50 of about 448,853 (274)

A novel approach to security enhancement of chaotic DSSS systems [PDF]

open access: yes, 2016
In this paper, we propose a novel approach to the enhancement of physical layer security for chaotic direct-sequence spread-spectrum (DSSS) communication systems. The main idea behind our proposal is to vary the symbol period according to the behavior of
Barlet Ros, Pere   +3 more
core   +1 more source

Validation of the Pediatric Arthritis Ultrasound Scoring System for the Elbow, Wrist, and Finger Joints in Children With Juvenile Idiopathic Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez   +12 more
wiley   +1 more source

Physical Layer Security Schemes in Space-Integrated-Ground Information Network

open access: yes天地一体化信息网络, 2020
Firstly, the current mainstream technologies of physical layer security were summarized and the relevant technical indicators were introduced; Then, the research on physical layer security in three typical scenarios of the space-integrated-ground ...
Fangshu MA   +3 more
doaj   +2 more sources

Secure physical layer network coding versus secure network coding [PDF]

open access: yes2018 IEEE Information Theory Workshop (ITW), 2018
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted)
openaire   +5 more sources

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

Physical Layer Security in Cognitive Millimeter Wave Networks

open access: yesIEEE Access, 2019
Millimeter wave (mmWave) communications and cognitive radio networks are two key technologies to improve the spectral efficiency. For a cognitive mmWave wiretap network in which randomly located eavesdroppers may reside in the signal beam of the ...
Yi Song   +4 more
doaj   +1 more source

Physical layer security of NOMA-D2D cooperative wireless system

open access: yesDianxin kexue, 2022
Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model ...
Yifan DING, Guangqiu LI, Hui LI
doaj   +2 more sources

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

open access: yes, 2018
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser   +19 more
core   +1 more source

Physical Layer Security: Authentication, Integrity, and Confidentiality [PDF]

open access: yes, 2021
The goal of physical layer security (PLS) is to make use of the properties of the physical layer, including the wireless communication medium and the transceiver hardware, to enable critical aspects of secure communications. In particular, PLS can be employed to provide i) node authentication, ii) message authentication, and, iii) message ...
Shakiba-Herfeh, Mahdi   +2 more
openaire   +3 more sources

Can Ti‐Based MXenes Serve as Solid Lubricants for Brake Applications? A Tribological Study

open access: yesAdvanced Engineering Materials, EarlyView.
This study explores the first implementation of Ti‐based MXenes materials in brake pad friction composite material. The resulting composite material exhibits a 48% reduction in the wear rate; alongside significant improvements are observed for thermal and mechanical properties.
Eslam Mahmoud   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy