Results 41 to 50 of about 275,240 (330)

Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]

open access: yes, 2012
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B.   +4 more
core   +1 more source

A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol

open access: yesCybernetics and Information Technologies, 2018
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy.
Usha S., Kuppuswami S., Karthik M.
doaj   +1 more source

Secrecy, Efficiency, Transparency in EU Negotiations: Conflicting Paradigms?

open access: yesPolitics and Governance, 2017
This contribution considers how the values of transparency and efficiency are realised in the context of “EU negotiations” both in the internal and the external sphere.
Päivi Leino
doaj   +1 more source

The influence of culture on accounting judgment – Evidence from Poland and the United Kingdom

open access: yesCogent Business & Management, 2022
This study investigates whether national culture influences judgments made by Polish and British accounting professionals when interpreting selected International Financial Reporting Standards (IFRS) that contain uncertainty expressions.
Jerzy Gierusz   +3 more
doaj   +1 more source

Exercise Interventions in Children, Adolescents and Young Adults With Paediatric Bone Tumours—A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser   +5 more
wiley   +1 more source

Minority Decision: More Secure Voting Mechanism for Distributed Consistency Algorithm

open access: yesJisuanji kexue yu tansuo, 2020
At present, the election based distributed consistency algorithm (Paxos like algorithm) applied in distri-buted system is elected by more than 50% of the voters.
LI Bin, JIANG Jianguo
doaj   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Secrecy Results for Compound Wiretap Channels

open access: yes, 2012
We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and
AD Wyner   +18 more
core   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Protecting Traditional Knowledge – Does Secrecy Offer a Solution? [PDF]

open access: yesPotchefstroom Electronic Law Journal, 2010
The shortcomings of using the intellectual property system to safeguard the interests of traditional knowledge holders have received considerable attention.
LA Tong
doaj  

Home - About - Disclaimer - Privacy