Search
Search Results
-
Seasonal and Habitat-related Variations in the Cuticular Chemical Profile of Atta sexdens (Hymenoptera: Formicidae) Foraging Workers
Cuticular hydrocarbons (CHCs) protect insects from dehydration and pathogen attack and participate in interindividual communication. In social...
-
Bridging big data in the ENIGMA consortium to combine non-equivalent cognitive measures
Investigators in neuroscience have turned to Big Data to address replication and reliability issues by increasing sample size. These efforts unveil...
-
On extreme points and representer theorems for the Lipschitz unit ball on finite metric spaces
In this note, we provide a characterization for the set of extreme points of the Lipschitz unit ball in a specific vectorial setting. While the...
-
Spectrum sharing for LTE and 5G-NR coexistence
Spectrum sharing provides a rapid migration pathway toward 5G by enabling the coexistence of 4G LTE and 5G new radio (NR) that share the same...
-
Fundamentals of Carpal Tunnel Syndrome
Nervous compression syndromes of the upper extremity have a marked prevalence worldwide. The condition is mainly due to nerve damage caused by acute... -
Graphene-Based Log-Periodic Dipole Antenna-Shaped MIMO Antenna Structure for the Terahertz Frequency Spectrum
Log-periodic dipole antenna-shaped multiple-input multi-output (MIMO) with multiband operation features employing graphene resonator material...
-
Analysis of gyrobianisotropic media effect on the input impedance, field distribution and mutual coupling of a printed dipole antenna
In this paper, we present an analytical study for the investigation of the effects of the magnetoelectric elements of a reciprocal and nonreciprocal...
-
Security for UDNs: A Step Toward 6G
The next-generation mobile networks are taking advantage of small cell technology toward building the notion of ultra-dense networks (UDNs). The... -
Drive Towards 6G
As fifth-generation (5G) mobile networks are being rolled out, the telecom industry and academia are now coordinating the 6G research effort towards... -
Virtual Networking for Lowering Cost of Ownership
5G and beyond mobile networks hold the promise of supporting a vast emergence of new services and increased traffic growth. This represents a... -
Energy-Efficient RF for UDNs
Multi-standard RF front-end is a critical part of legacy and future emerging mobile architectures, where the size, the efficiency, and the... -
Enabling 6G Mobile Networks
This book tackles the 6G odyssey, providing a concerted technology roadmap towards the 6G vision focused on the interoperability between the wireless...
-
-
Correction to: Joint rate control and power allocation for low-latency reliable D2D-based relay network
Please note that in the original article [1] an incorrect address has been provided for affiliation ‘2’.
-
Joint rate control and power allocation for low-latency reliable D2D-based relay network
Emerging 5G applications impose stringent requirements on network latency and reliability. In this work, we propose a low-latency reliable...
-
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
Intrusion Detection System (IDS) is crucial to protect smartphones from imminent security breaches and ensure user privacy. Android is the most...
-
Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable... -
Design of Asymmetrical Doherty GaN HEMT Power Amplifiers for 4G Applications
In this paper, a 2-stage Doherty power amplifier and a single class B at 3.800 GHz, based on a 10 W GaN-HEMT technology using the bandwidth up to... -
Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0
The heavy reliance of Industry 4.0 on emerging communication technologies, notably Industrial Internet-of-Things (IIoT) and Machine-Type... -
Security Framework for the Semiconductor Supply Chain Environment
This paper proposes a security framework for secure data communications across the partners in the Semiconductor Supply Chain Environment. The...