Results 91 to 100 of about 353,955 (333)
Internet traffic dynamics [PDF]
The telecommunications industry has evolved at unprecedented rates with current estimates suggesting that seven percent of the world’s population now has access to the Internet.
Coble-Neal, Grant, Madden, Gary G
core +1 more source
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless ...
Shixun Gong +3 more
doaj +1 more source
Teletraffic studies of digital wireless telecommunications networks
Hiew Pang Leang
openalex +1 more source
Super‐Robust Telecommunications Enabled by Topological Half‐Supermodes
Through topological half‐supermode engineering, we realize a valley‐ridge gap waveguide that is directly compatible with conventional waveguides and features topological protection. This design halves the lateral size via a PEC boundary, enabling direct TE₁₀‐mode matching and robust bend‐immune transmission.
Rui Zhou +8 more
wiley +1 more source
Interference alignment schemes for k-user interference channel based on manifold optimization
Interference alignment (IA) is a key technology for achieving the capacity scaling required by next generation wireless networks, which is proved to obtain the maximum degrees of freedom (DoF).
Chen Zhang +3 more
doaj +1 more source
A fully edible soft electrode is engineered from Ca2⁺‐crosslinked alginate integrated with polydopamine, silver nanoparticles, and food‐grade glucose oxidase. The hybrid hydrogel combines ionic and electronic conduction, enabling efficient glucose‐to‐H2O2 conversion and catalytic reduction in simulated intestinal fluid.
Verdiana Marchianò +10 more
wiley +1 more source
The cost structure of Australian telecommunications [PDF]
Since 1991 Australian telecommunications has undergone substantial reform. To a large extent, the economic correctness of pro-competitive policy depends on the non-existence of natural monopoly technology.
Bloch, Harry +2 more
core +1 more source
Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT).
Jiazhen Zhang +3 more
doaj +1 more source
High‐Rate Cross‐Channel Entanglement Swapping Between Independent On‐Chip Sources
To interconnect individual chip‐based quantum sources, high‐performance entanglement swapping is indispensable. Here, using low‐loss silicon chips with waveguide structure and frequency‐offset pumps, this work demonstrates high‐rate cross‐channel entanglement swapping.
Haoyang Wang +5 more
wiley +1 more source

