Results 21 to 30 of about 1,340 (116)
Realising the oil supply potential of the CIS: the impact of institutions and policies [PDF]
This paper provides an overview of the political economy of oil in the CIS. It briefly situates the region’s oil sector potential in the global context, before analysing the structural features of the oil sectors by country.
Ahrend, R., Tompson, William
core +1 more source
Physical Layer Security in Cognitive Untrusted Relay Networks
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link ...
Dechuan Chen +4 more
doaj +1 more source
Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping [PDF]
The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers.
Chorti, Arsenia +4 more
core +2 more sources
The Security of Practical Quantum Key Distribution [PDF]
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
Agrawal, G. P. +64 more
core +2 more sources
Optimization of Code Rates in SISOME Wiretap Channels
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni +4 more
core +1 more source
Physical Layer Security in an Untrusted Energy Harvesting Relay Network
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered. It is assumed that the source and multiple destinations are equipped with multiple antennas, and the information transmission is aided by a single-antenna ...
Hui Shi +5 more
doaj +1 more source
Info-Clustering: A Mathematical Theory for Data Clustering
We formulate an info-clustering paradigm based on a multivariate information measure, called multivariate mutual information, that naturally extends Shannon's mutual information between two random variables to the multivariate case involving more than ...
Al-Bashabsheh, Ali +4 more
core +1 more source
Effects of selective harvest on antler size of white‐tailed deer in Texas, USA
We conducted 20 years of experiments on the selective harvest of white‐tailed deer by antler size, judged inferior, in 2 areas of South Texas, USA. Selective harvest increased the phenotypic antler size of older males in one study area but not the other. There was little evidence of evolution resulting from selective harvesting. Abstract There has been
Don A. Draeger +8 more
wiley +1 more source
Summary Modernising the European Union’s plant variety registration system is critical to enabling the development and adoption of sustainable, climate‐resilient varieties aligned with the EU Farm‐to‐Fork Strategy. However, the current system is outdated and under increasing pressure. While legislative reform is underway, key points of divergence among
Sergio Urioste Daza +2 more
wiley +1 more source
This study demonstrates that full‐thickness 3D in vitro skin models reliably assess the permeation of cosmetic polyphenols, revealing compound‐specific transport profiles and bridging the gap between conventional cell models and ex vivo human skin, while offering an ethical and robust alternative for dermal absorption screening. Abstract The evaluation
Mariana Marques +6 more
wiley +1 more source

