Results 41 to 50 of about 912,248 (296)

Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks

open access: yesIEEE Access, 2017
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for improving the physical layer security of decode-and-forward wireless networks where a source node transmits to its destination with the aid of multiple intermediate ...
Haiyan Guo   +4 more
doaj   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

HERO: Human Emotions Recognition for Realizing Intelligent Internet of Things

open access: yesIEEE Access, 2019
Human emotions recognition (HERO) is considered as one of the important techniques for realizing the intelligent Internet of Things. The demand for a robust and precise facial expression recognition algorithm is urgent for the HERO.
Wentao Hua   +4 more
doaj   +1 more source

QSPCA: A two-stage efficient power control approach in D2D communication for 5G networks

open access: yesIntelligent and Converged Networks, 2021
The existing literature on device-to-device (D2D) architecture suffers from a dearth of analysis under imperfect channel conditions. There is a need for rigorous analyses on the policy improvement and evaluation of network performance. Accordingly, a two-
Saurabh Chandra   +4 more
doaj   +1 more source

A wireless sensor network system deployment for detecting stick slip motion in glaciers

open access: yes, 2012
The behaviour of glaciers is an area in which only limited research has been carried out due to the difficulties of monitoring sub-glacial movements.
Basford, Philip   +3 more
core   +1 more source

Internal combustion engine sensor network analysis using graph modeling [PDF]

open access: yes, 2017
In recent years there has been a rapid development in technologies for smart monitoring applied to many different areas (e.g. building automation, photovoltaic systems, etc.). An intelligent monitoring system employs multiple sensors distributed within a
A. Corsini   +15 more
core   +1 more source

Networking issues in wireless sensor networks [PDF]

open access: yesJournal of Parallel and Distributed Computing, 2004
The emergence of sensor networks as one of the dominant technology trends in the coming decades (Technol. Rev. (February 2003)) has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to ...
Ganesan, Deepak   +5 more
openaire   +2 more sources

Personalized Selumetinib Dosing in Pediatric Neurofibromatosis Type 1: Insights From a Pilot Therapeutic Drug Monitoring Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács   +8 more
wiley   +1 more source

An Improved Intrusion Detection Algorithm Based on GA and SVM

open access: yesIEEE Access, 2018
In the era of big data, with the increasing number of audit data features, human-centered smart intrusion detection system performance is decreasing in training time and classification accuracy, and many support vector machine (SVM)-based intrusion ...
Peiying Tao, Zhe Sun, Zhixin Sun
doaj   +1 more source

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

open access: yesIEEE Access, 2017
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj   +1 more source

Home - About - Disclaimer - Privacy