Results 31 to 40 of about 193,653 (266)
A Fuzzy Logic-Based Directional Charging Scheme for Wireless Rechargeable Sensor Networks
Wireless Power Transfer (WPT) has become a key technology to extend network lifetime in Wireless Rechargeable Sensor Networks (WRSNs). The traditional omnidirectional recharging method has a wider range of energy radiation, but it inevitably results in ...
Yuhan Ma +4 more
doaj +1 more source
AEMB: An Automated Exploit Mitigation Bypassing Solution
Modern operating systems set exploit mitigations to thwart the exploit, which has also become a barrier to automated exploit generation (AEG). Many current AEG solutions do not fully account for exploit mitigations, and as a result, they are unable to ...
Ruipeng Wang +3 more
doaj +1 more source
Formulating cryptographic definitions to protect against software piracy is an important research direction that has not received much attention. Since natural definitions using classical cryptography are impossible to achieve (as classical programs can always be copied), this directs us towards using techniques from quantum computing. The seminal work
Ananth, Prabhanjan, La Placa, Rolando L.
openaire +2 more sources
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source
A Novel Two-Terminal Reliability Analysis for MANET
Mobile ad hoc network (MANET) is a dynamic wireless communication network. Because of the dynamic and infrastructureless characteristics, MANET is vulnerable in reliability. This paper presents a novel reliability analysis for MANET.
Xibin Zhao, Zhiyang You, Hai Wan
doaj +1 more source
Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle +11 more
wiley +1 more source
Calculation of the Behavior Utility of a Network System: Conception and Principle
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison.
Changzhen Hu
doaj +1 more source
Automated Risk Management Based Software Security Vulnerabilities Management
An automated risk assessment approach is explored in this work. The focus is to optimize the conventional threat modeling approach to explore software system vulnerabilities.
Raghavendra Rao Althar +4 more
doaj +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source

