Results 41 to 50 of about 275,240 (330)
Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B. +4 more
core +1 more source
A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy.
Usha S., Kuppuswami S., Karthik M.
doaj +1 more source
Secrecy, Efficiency, Transparency in EU Negotiations: Conflicting Paradigms?
This contribution considers how the values of transparency and efficiency are realised in the context of “EU negotiations” both in the internal and the external sphere.
Päivi Leino
doaj +1 more source
The influence of culture on accounting judgment – Evidence from Poland and the United Kingdom
This study investigates whether national culture influences judgments made by Polish and British accounting professionals when interpreting selected International Financial Reporting Standards (IFRS) that contain uncertainty expressions.
Jerzy Gierusz +3 more
doaj +1 more source
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser +5 more
wiley +1 more source
Minority Decision: More Secure Voting Mechanism for Distributed Consistency Algorithm
At present, the election based distributed consistency algorithm (Paxos like algorithm) applied in distri-buted system is elected by more than 50% of the voters.
LI Bin, JIANG Jianguo
doaj +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Secrecy Results for Compound Wiretap Channels
We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and
AD Wyner +18 more
core +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Protecting Traditional Knowledge – Does Secrecy Offer a Solution? [PDF]
The shortcomings of using the intellectual property system to safeguard the interests of traditional knowledge holders have received considerable attention.
LA Tong
doaj

