Results 41 to 50 of about 9,853 (272)

Artificial Intelligence in Systemic Sclerosis: Clinical Applications, Challenges, and Future Directions

open access: yesArthritis Care &Research, EarlyView.
Systemic sclerosis (SSc) is a rare autoimmune disease defined by immune dysregulation, vasculopathy, and progressive fibrosis of the skin and internal organs. Despite advances in care, major complications such as interstitial lung disease (ILD) and myocardial involvement remain the leading causes of morbidity and mortality.
Cristiana Sieiro Santos   +2 more
wiley   +1 more source

Secure Communications for the Two-user Broadcast Channel with Random Traffic

open access: yes, 2017
In this work, we study the stability region of the two-user broadcast channel (BC) with bursty data arrivals and security constraints. We consider the scenario, where one of the receivers has a secrecy constraint and its packets need to be kept secret ...
Angelakis, Vangelis   +4 more
core   +1 more source

The Youth Correction Authority Act [PDF]

open access: yes, 1942
Since wireless communication has become a standard feature in the daily life, smartphones and tablets among other things are integrated with the Bluetooth technology.
Waite, John Barker
core   +3 more sources

Unlocking Photodetection Mode Switching from a Simple Lateral Design

open access: yesAdvanced Functional Materials, EarlyView.
A simple lateral 2D perovskite photodetector capable of switching among transient, continuous, and dual transient/continuous photoresponse modes is achieved by integrating photoconductive effects with capacitive coupling from the SiO2/Si substrate. Such light‐programmable photodetection mode switching enables triple‐channel information transmission and
Zijun (June) Yong   +10 more
wiley   +1 more source

Towards Secure and Energy-Efficient CRNs Via Embracing Interference: A Stochastic Geometry Approach

open access: yesIEEE Access, 2018
In a cognitive radio network (CRN), the interference caused by secondary users (SUs) is conventionally regarded as an obstacle to the throughput of the primary network. However, when considering security, the interference brings potential benefits to the
Xiaoying Liu   +4 more
doaj   +1 more source

Solution‐Processed Two‐Dimensional Indium Oxide on Sodium‐Embedded Alumina for Reconfigurable Optoelectronic Synaptic Transistors

open access: yesAdvanced Functional Materials, EarlyView.
Wafer‐scale two‐dimensioanl In2Se3 oxidized into InOx on sodium‐embedded beta‐alumina enables multifunctional reconfigurable electronics. Sodium ions accumulate within distinct spatial distribution under drain‐controlle and gate‐controlled operation. Drain‐control operation gives controllability of ultraviolet‐driven optoelectronic synaptic conductance
Jinhong Min   +13 more
wiley   +1 more source

Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

open access: yes, 2017
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by ...
Han, Zhu   +4 more
core   +1 more source

Transfer Printing and Reconfiguration of Soft Electronics Using Digital Microfluidics and Laser Machining

open access: yesAdvanced Functional Materials, EarlyView.
This paper presents a digital microfluidics‐based technique for transferring and reconfiguring soft nanomembranes. Laser‐machined nanothin membranes are picked up, transported, and aligned via tailored surface tension and the actuation of water droplets, enabling the development of flexible electronics, the integration of functional materials on 3D ...
Quang Anh Nguyen   +15 more
wiley   +1 more source

Cooperative Secure Transmission in the Presence of Untrusted Relay

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen   +4 more
doaj   +1 more source

Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter

open access: yesIEEE Access, 2016
This paper addresses the establishment of secure communication links between Alice and Bob in the presence of an eavesdropper (Eve). The proposed scenario assumes: 1) MIMOME wiretap channel; 2) transmit antenna selection at the Alice; 3) no channel state
Hirley Alves   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy