Results 191 to 200 of about 9,853 (272)
Secure energy outage analysis of UAV swarm-based network. [PDF]
Nguyen TH, Tran HV.
europepmc +1 more source
This illustration integrates key concepts covered in the review, including high‐risk populations, viral structure, host entry factors, the replication cycle, and licensed antibody‐based prevention strategies. ABSTRACT Respiratory syncytial virus (RSV) is a negative‐sense RNA virus belonging to the genus Orthopneumovirus within the family Pneumoviridae.
Zekai Cheng +3 more
wiley +1 more source
Blockchain-driven smart contract with key exchange protocol for secure device-to-device communication using verkle tree K-ary structures. [PDF]
Simbu A, Nandakumar S, Saravanan K.
europepmc +1 more source
Beyond Traditional Screening: The Future of Heart Failure Detection With Biomarkers and AI
Advancing HF Screening: Integrating Technology and Risk Factors Across Eras. This diagram provides a comprehensive review of the historical developments and projected trends of heart failure (HF) screening methodologies, with the prevalent risk factors for HF depicted at the base.
Xiaofeng Fang +9 more
wiley +1 more source
Intelligent reflecting surface backscatter-enabled physical layer security enhancement <i>via</i> deep reinforcement learning. [PDF]
Ahmed M +7 more
europepmc +1 more source
Discovery and validation of a urinary extracellular vesicle protein signature for the diagnosis of renal allograft fibrosis. Abstract Interstitial fibrosis is the best indicator of irreversible or ongoing renal injury after kidney transplantation and faces considerable diagnostic challenges.
Wenxuan Zhao +12 more
wiley +1 more source
Interior Point-Driven Throughput Maximization for TS-SWIPT Multi-Hop DF Relays: A Log Barrier Approach. [PDF]
Yu Y, Tang X, Xie G.
europepmc +1 more source
Tales From Within: Dental Students’ Reflective Activities Involving Equity‐Deserving Communities
ABSTRACT Objective Undergraduate dental training benefits from community service‐learning (CSL) placements, in which equity‐deserving groups receive oral health care and students can critically reflect on their experiences. This study aimed to thematically explore the moments of revelation and struggle that senior dental students reflected on while ...
Mario Brondani +2 more
wiley +1 more source
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
Abstract This study explores how social enterprises create social and economic value through business models that support ex‐offenders. The work was motivated by a request for help from an entrepreneur wishing to establish a business that supports ex‐offender rehabilitation.
Elizabeth Green +2 more
wiley +1 more source

