Results 81 to 90 of about 9,853 (272)

Optimal Access Scheme for Security Provisioning of C-V2X Computation Offloading Network With Imperfect CSI

open access: yesIEEE Access, 2020
In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network, vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle-to-infrastructure (V2I) transmission links in order to accommodate ...
Bin Qiu   +4 more
doaj   +1 more source

Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook

open access: yesAdvanced Materials Technologies, EarlyView.
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi   +12 more
wiley   +1 more source

Cooperative jamming for secrecy in decentralized wireless networks

open access: yes, 2015
Cooperative jamming as a physical layer security enhancement has recently drawn considerable attention. While most existing works focus on communication systems with a small number of nodes, we investigate the use of cooperative jamming for providing ...
Kennedy, Rodney   +2 more
core   +1 more source

Additive Manufacturing of Patient‐Specific Intracranial Aneurysm Cell Culture Models

open access: yesAdvanced Materials Technologies, EarlyView.
Patient‐specific intracranial aneurysm models were fabricated using chocolate moulding, 3D printed water‐soluble cores, and direct resin 3D printing. Moulding PDMS around sacrificial cores made of chocolate or 3D printed water‐soluble resin yielded accurate, expandable, and endothelializable models that outperformed resin‐based approaches.
Chloe M. de Nys   +6 more
wiley   +1 more source

Decoding Triphenotypic Neutrophils in Cervical Cancer Evolution and Targeting SPP1+/GBP1+/ELOVL5+ Tumor‐Associated Neutrophils to Sensitize Immunotherapy

open access: yesAdvanced Science, EarlyView.
The functional schematic diagram of tumor associated neutrophils. Abstract Enhancing cervical cancer (CC) immunotherapy requires deciphering the heterogeneous tumor immune microenvironment (TIME), particularly neutrophil phenotypic dynamics. Here, 1) we collected 543 CC cases to find that patients with elevated neutrophil levels have a higher incidence
Xingyu Chang   +7 more
wiley   +1 more source

GloPath: An Entity‐Centric Foundation Model for Glomerular Lesion Assessment and Clinicopathological Insights

open access: yesAdvanced Science, EarlyView.
An entity‐centric foundation model, GloPath, is introduced for comprehensive glomerular lesion assessment from routine renal biopsy images. Trained on over one million glomeruli, the framework enables robust lesion recognition, grading, and cross modality diag nosis, while uncovering large‐scale clinicopathological associations.
Qiming He   +28 more
wiley   +1 more source

Centralized and Cooperative Transmission of Secure Multiple Unicasts using Network Coding [PDF]

open access: yes, 2013
We introduce a method for securely delivering a set of messages to a group of clients over a broadcast erasure channel where each client is interested in a distinct message. Each client is able to obtain its own message but not the others'.
Kennedy, Rodney   +2 more
core  

In Vivo CRISPR Screening Identifies the Glutamate Receptor GRIA2 as Promoting Peritoneal Metastasis of Gastric Cancer via Calcium‐Dependent β‐Catenin Activation

open access: yesAdvanced Science, EarlyView.
We identified GRIA2 as a critical driver of gastric cancer peritoneal metastasis through in vivo CRISPR screening. Mechanistically, GRIA2‐mediated calcium influx inhibits GSK3β and activates Wnt/β‐catenin signaling, driven by glutamate from cancer‐associated fibroblasts.
Jie Sun   +13 more
wiley   +1 more source

Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay

open access: yesIEEE Access, 2018
In this paper, we investigate secure uplink transmission in a typical Internet of Things (IoT) deployment, where multiple sensors communicate with a controller via the assistance of an untrusted relay.
Dechuan Chen   +4 more
doaj   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy