Results 31 to 40 of about 1,643 (150)
Physical Layer Security in an Untrusted Energy Harvesting Relay Network
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered. It is assumed that the source and multiple destinations are equipped with multiple antennas, and the information transmission is aided by a single-antenna ...
Hui Shi +5 more
doaj +1 more source
Info-Clustering: A Mathematical Theory for Data Clustering
We formulate an info-clustering paradigm based on a multivariate information measure, called multivariate mutual information, that naturally extends Shannon's mutual information between two random variables to the multivariate case involving more than ...
Al-Bashabsheh, Ali +4 more
core +1 more source
TAS-Based Incremental Hybrid Decode–Amplify–Forward Relaying for Physical Layer Security Enhancement [PDF]
In this paper, a transmit antenna selection (TAS)- based incremental hybrid decode-amplify-forward (IHDAF) scheme is proposed to enhance physical layer security in cooperative relay networks.
Feng, Youhong +4 more
core +1 more source
In this paper, we consider a millimeter-wave (mmWave) wiretap scenario where a multiple-antenna base station (Alice) communicates with a legitimate user (Bob) via a reconfigurable intelligent surface (RIS) amid multiple colluding eavesdroppers (Eves ...
Phuc V. Trinh, S. Sugiura
semanticscholar +1 more source
Summary Modernising the European Union’s plant variety registration system is critical to enabling the development and adoption of sustainable, climate‐resilient varieties aligned with the EU Farm‐to‐Fork Strategy. However, the current system is outdated and under increasing pressure. While legislative reform is underway, key points of divergence among
Sergio Urioste Daza +2 more
wiley +1 more source
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva +9 more
wiley +1 more source
ABSTRACT Understanding gene flow between ploidy levels in polyploid complexes is essential for species delimitation and conservation. This study explores evolutionary dynamics in the polyploid complex Thymus sect. Mastichina (Lamiaceae), comprising three taxa: T. mastichina subsp. mastichina, T. mastichina subsp.
Francisco José García‐Cárdenas +7 more
wiley +1 more source
Exosomes, modified through multidimensional approaches including physical, chemical and genetic means, and equipped with brain‐targeted peptides and therapeutic agents, are capable of crossing the blood‒brain barrier for precise delivery. They can simultaneously remove amyloid‐beta plaques and neurofibrillary tangle, inhibit neuroinflammation, and pave
Yuehan Zhang +4 more
wiley +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
In this study, physical layer security (PLS) in a dual-hop underwater optical wireless communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links is considered. An intermediate decode-and-forward
Moloy Kumar Ghosh +9 more
doaj +1 more source

