Results 91 to 100 of about 142,545 (277)

On Edge Caching with Secrecy Constraints

open access: yes, 2016
In this paper we investigate the problem of optimal cache placement under secrecy constraints in heterogeneous networks, where small-cell base stations are equipped with caches to reduce the overall backhaul load. For two models for eavesdropping attacks,
Bioglio, Valerio   +2 more
core   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Secrecy Performance Analysis of Wireless Sensor Networks [PDF]

open access: yesIEEE Sensors Letters, 2019
The wireless sensor network (WSN) plays a fundamentally important role in the realization of Internet of Things and Industry 4.0. In this article, we study the physical layer security performance of a large-scale ad hoc and homogeneous WSN. To accurately evaluate the secrecy performance of the large-scale WSN, we take into account the randomness of the
Yun Ai   +3 more
openaire   +2 more sources

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network

open access: yesTongxin xuebao, 2019
To alleviate the spectrum shortage problem and security threats in heterogeneous network (HetNet),multi-antenna full-duplex relay was introduced for communication between femto base station (FBS) and legitimate user.With the aid of multi-antenna full ...
Zhou ZHONG   +3 more
doaj   +2 more sources

Lipopolysaccharide uptake is augmented in lipopolysaccharide‐tolerant mouse macrophage‐like cells via increased CD14 expression

open access: yesFEBS Open Bio, EarlyView.
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara   +3 more
wiley   +1 more source

Risk Prediction Models for Recurrence After Curative Treatment of Early‐Stage or Locally Advanced Lung Cancer: A Systematic Review

open access: yesAging and Cancer, EarlyView.
This systematic review synthesizes prognostic models for survival and recurrence in resected non‐small cell lung cancer. While many models demonstrate moderate to good discrimination, few are externally validated and reporting quality is variable, limiting clinical applicability and highlighting the need for robust, transparent model development ...
Evangeline Samuel   +4 more
wiley   +1 more source

Secure Transmission for Differential Quadrature Spatial Modulation With Artificial Noise

open access: yesIEEE Access, 2019
In this paper, we investigate the secure transmission for differential quadrature spatial modulation (DQSM) with artificial noise (AN) in multiple-input single-output wiretap networks, where a cooperative jammer helps the secure transmission between ...
Yong Wang   +5 more
doaj   +1 more source

Secrecy performance of cognitive cooperative industrial radio networks

open access: yes2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2017
Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance spectrum utilization, it can also be used to improve reliability by avoiding interference in the 2.4 or 5 GHz band. Using multiple relay nodes in CRNs, the outage probability, i.e., the probability that the end-to-end signal-to-noise ratio drops below a ...
Quach, Truong Xuan   +3 more
openaire   +3 more sources

Prognostic Implications of Sleep Architecture for Patients Admitted to the Intensive Care Unit With Status Epilepticus

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy