Results 61 to 70 of about 4,724 (196)

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel

open access: yes, 2015
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises
Liu, Liang, Xing, Hong, Zhang, Rui
core   +1 more source

Experiences of parents of children with special needs: Educational services, challenges and recommendations from parents' perspectives

open access: yesBritish Journal of Special Education, EarlyView.
Abstract Parents of children with special needs in Nigeria are faced with several challenges. In most cases, decisions are taken without their active involvement, despite them being the primary carers for their children with special needs. This research utilised a qualitative research design with fifteen participants to understand parents' perspectives
Noah Agbo, Sylvia Yeboah Boamah
wiley   +1 more source

Physical Layer Security Scheme Based on Jointly Optimal Relay Selection [PDF]

open access: yesJisuanji gongcheng, 2019
To improve the security level of information transmission in Cognitive Radio(CR) networks,a physical layer security scheme based on jointly optimal transmission relay and interference relay selection is proposed.This paper considers a primary network in ...
WANG Shaodi,GAO Baojian,ZHANG Yucheng,ZHAO Ze
doaj   +1 more source

Hurricane‐induced risk contagion in commercial real estate: Evidence from Hurricane Sandy

open access: yesReal Estate Economics, EarlyView.
Abstract This study examines how hurricane‐induced destruction affects the prices of nearby undamaged commercial real estate properties, using Hurricane Sandy as a natural experiment. Using Real Capital Analytics transaction records spatially merged with Federal Emergency Management Agency building‐level damage data, we empirically employ a difference ...
Lu Fang   +3 more
wiley   +1 more source

SMAA‐Based FITradeoff: An Efficient Framework for Pairwise Elicitation in Multicriteria Decision Analysis

open access: yesJournal of Multi-Criteria Decision Analysis, Volume 33, Issue 2, August 2026.
ABSTRACT The Flexible and Interactive Tradeoff Elicitation (FITradeoff) method is a Multi‐Attribute Decision‐Making (MADM) approach designed to capture the preferences of a Decision Maker (DM) while minimising cognitive effort. To reduce the frequency of interactions and optimise the preference elicitation process, this paper introduces an innovative ...
Qian Zhao   +3 more
wiley   +1 more source

Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems [PDF]

open access: yes2014 IEEE/CIC International Conference on Communications in China (ICCC), 2014
In this paper, we explore the physical-layer security of a multi-user wireless system that consists of multiple users intending to transmit to a base station (BS), while multiple eavesdroppers attempt to tap the user transmissions. We examine the employment of multi-user scheduling for improving the transmission security against eavesdropping and ...
Yulong Zou   +3 more
openaire   +2 more sources

Perspectives On Machine Learning Inference Serving in Real‐World Settings

open access: yesSoftware: Practice and Experience, Volume 56, Issue 6, Page 734-757, June 2026.
ABSTRACT Introduction As machine learning (ML)‐enabled systems become increasingly prevalent across industries, the engineering challenges of deploying and maintaining them in production have emerged as critical. The existing engineering knowledge base often derives from conceptual frameworks or case studies conducted by large technology companies ...
Dennis Muiruri   +3 more
wiley   +1 more source

Secrecy Performance of Land Mobile Satellite Systems With Imperfect Channel Estimation and Multiple Eavesdroppers

open access: yesIEEE Access, 2019
The inherent broadcast nature has exposed the land mobile satellite (LMS) communication systems to severe security threats in both the civil and military applications.
Yusheng Li   +3 more
doaj   +1 more source

Secrecy Outage Analysis Over Fluctuating Two-Ray Fading Channels

open access: yes, 2019
In this letter, we analyze the secrecy outage probability (SOP) over fluctuating two-ray fading channels but with a different definition from the one adopted in [5].
Alouini, Mohamed-Slim   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy