Results 71 to 80 of about 1,248,788 (338)

On the IID Capacity-Achieving Input for Binding Channels With Multiple Ligand Receptors

open access: yesIEEE Access, 2019
This paper studies the molecular communication system where the transmitter has limited productivity and the receiver employs ligand-binding receptors.
Jianfeng Sun, Hui Li
doaj   +1 more source

Simulative Investigation of the Hybrid, Spatially Multiplexed MIMO-FSO Transmission System Under Atmospheric Turbulence

open access: yesIEEE Access, 2023
An orbital angular momentum (OAM) technology, which uses twisted helical phase structure laser modes to carry multiplexed information, has shown excellent potential to improve the capacity of the free space optical communication (FSO) system under ...
Shivaji Sinha   +5 more
doaj   +1 more source

Efficient Approximation of Channel Capacities [PDF]

open access: yesIEEE Transactions on Information Theory, 2015
32 pages, 3 figures, revised ...
Tobias Sutter   +3 more
openaire   +4 more sources

Feedback Capacity of the Compound Channel

open access: yes, 2007
In this work we find the capacity of a compound finite-state channel with time-invariant deterministic feedback. The model we consider involves the use of fixed length block codes. Our achievability result includes a proof of the existence of a universal
Permuter, Haim, Shrader, Brooke
core   +2 more sources

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach

open access: yesIEEE Access, 2019
Ensuring multimedia content security is one of the main targets to solve multimedia information security problems and k-anonymous model is a classic and effective model to protect personal information when we publish multimedia data.
Cheng Liu   +5 more
doaj   +1 more source

Optimal User Scheduling in Multi Antenna System Using Multi Agent Reinforcement Learning

open access: yesSensors, 2022
Multiple Input Multiple Output (MIMO) systems have been gaining significant attention from the research community due to their potential to improve data rates.
Muddasar Naeem   +4 more
doaj   +1 more source

The quantum capacity with symmetric side channels [PDF]

open access: yes, 2008
We present an upper bound for the quantum channel capacity that is both additive and convex. Our bound can be interpreted as the capacity of a channel for high-fidelity quantum communication when assisted by a family of channels that have no capacity on ...
Smith, Graeme   +2 more
core   +3 more sources

Hybrid zero-capacity channels [PDF]

open access: yesPhysical Review A, 2012
There are only two known kinds of zero-capacity channels. The first kind produces entangled states that have positive partial transpose, and the second one - states that are cloneable. We consider the family of 'hybrid' quantum channels, which lies in the intersection of the above classes of channels and investigate its properties. It gives rise to the
Jonathan Oppenheim, Sergii Strelchuk
openaire   +3 more sources

Purification tags markedly affect self‐aggregation of CPEB3

open access: yesFEBS Letters, EarlyView.
Although recombinant proteins are used to study protein aggregation in vitro, uncleaved tags can interfere with accurate interpretation. Our findings demonstrate that His₆‐GFP and His₁₂ tags significantly affect liquid droplet and amyloid fibril formation in the intrinsically disordered region (IDR) of mouse cytoplasmic polyadenylation element‐binding ...
Harunobu Saito   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy