Results 41 to 50 of about 54,785 (276)

Security-Reliability Analysis in CR-NOMA IoT Network Under I/Q Imbalance

open access: yesIEEE Access, 2023
This paper presents a controllable analysis framework for evaluating the reliability and security of underlay cognitive radio networks (CRs) relying on non-orthogonal multiple access (NOMA).
Hung Nguyen   +5 more
doaj   +1 more source

On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol [PDF]

open access: yes, 2020
This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies.
Tran, Thanh-Nam, Vozňák, Miroslav
core   +1 more source

Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays

open access: yes, 2015
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming   +4 more
core   +1 more source

Half-duplex energy harvesting relay network over different fading environment: System performance with effect of hardware impairment [PDF]

open access: yes, 2019
In this paper, we introduce a half-duplex (HD) energy harvesting (EH) relay network over the different fading environment with the effect of hardware impairment (HI).
Dong, Si Thien Chau   +4 more
core   +1 more source

Optimization of Code Rates in SISOME Wiretap Channels

open access: yes, 2015
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni   +4 more
core   +1 more source

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]

open access: yes, 2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe   +5 more
core   +2 more sources

Security Improvement With QoS Provisioning Using Service Priority and Power Allocation for NOMA-IoT Networks

open access: yesIEEE Access, 2021
Non-orthogonal multiple access (NOMA) has gained attention as a promising multiple access scheme for the Internet of Things (IoT). A typical setting of user ordering in NOMA networks with user priority difference allows a service priority for solely low ...
Waqas Khalid, Heejung Yu
doaj   +1 more source

On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels [PDF]

open access: yes, 2013
In this paper, we investigate the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code.
Matthew R. Mckay   +3 more
core   +2 more sources

Efficient Wireless Security Through Jamming, Coding and Routing

open access: yes, 2013
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa   +3 more
core   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

Home - About - Disclaimer - Privacy