…increase in activation energy for small-polaron hopping was found and ascribed to strong electron–phonon coupling and complex lattice oscillations therein. Plain relations of the activation energy to microstructure, composition, or…
Ubiquitous computing continues to transform our lives, including our homes and leisure activities. Smart home energy management system (SHEMS) are one example of such a technology. It connects homes to…
Usably secure ad-hoc device pairing fosters connectivity with hardware which is difficult to access (e.g., implanted) and grants convenience for ad-hoc short-term on-off pairing patterns (e.g. shared public domain). Examples…
…channel estimation. We show, by numerical examples, that the proposed technique achieves good performance with fewer pilot resources when compared to compressed sensing or antenna specific pilot based channel estimation….
…for providing connectivity in Intelligent Transport Systems (ITS), we argue that a combination of the two datasets enables the study of Vehicle-to-Everything (V2X) connectivity in its entire complexity. We describe…
Near-infrared spectroscopy (NIRS) measures the light reflected from objects to infer highly detailed information about their molecular composition. Traditionally, NIRS has been an instrument reserved for laboratory usage, but recently…
The n-back task is widely used in working memory (WM) research. However, it remains unclear how the electrophysiological correlates of WM processes, the P2, N2, P300, and negative slow wave…
Recent technological development offers new possibilities for taking into account peoples’ personal wellness data in adjustment of environment conditions. For example, users’ heartrate, facial expression, room temperature, and CO₂ data…
…a systematic classification of the state of the solutions by examining research results and observations for each of the four components and present a taxonomy that includes practical problems, adopted…
…provide a comprehensive insight on the practical implementation of wireless systems with different levels of secrecy requirements. Considering the partial secrecy regime, in this paper we examine the secrecy performance…