Results 51 to 60 of about 306,585 (324)
Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery [PDF]
In this paper, we investigate the achievable secrecy rates in an Energy Harvesting communication system composed of one transmitter and multiple receivers.
Biason, Alessandro +3 more
core +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
This article explores findings from research into the impact of adoption throughout the life course of adults who were adopted in the era of secrecy, the 1940s–1970s.
Patricia Robinson
doaj +1 more source
Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II
Secrecy and informal organisation produce, sustain, and reinforce feelings of loyalty within intelligence and security services. This article demonstrates that loyalty is needed for cooperation between intelligence partners as well as within and between ...
Eleni Braat
doaj +1 more source
In the last decade the number of countries aiming to resettle refugees increased and complementary pathways aiming to relocate humanitarian migrants expanded.
Agathe Menetrier, Agathe Menetrier
doaj +1 more source
Energy Efficiency Maximization for Full-Duplex UAV Secrecy Communication [PDF]
This paper proposes a new full-duplex (FD) secrecy communication scheme for the unmanned aerial vehicle (UAV) and investigates its optimal design to achieve the maximum energy efficiency (EE) of the UAV.
Bin Duo +3 more
semanticscholar +1 more source
Implementing Health‐Related Quality of Life Assessment in Pediatric Oncology: A Feasibility Study
ABSTRACT Background There is growing interest in embedding health‐related quality of life (HRQoL) assessment and patient‐reported outcome measures (PROMs) within clinical cancer care. This study evaluated the feasibility, acceptability, and usability of implementing an electronic PROM (ePROM) platform to measure HRQoL in children with cancer ...
Mikaela Doig +13 more
wiley +1 more source
A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy.
Usha S., Kuppuswami S., Karthik M.
doaj +1 more source
Secrecy, Efficiency, Transparency in EU Negotiations: Conflicting Paradigms?
This contribution considers how the values of transparency and efficiency are realised in the context of “EU negotiations” both in the internal and the external sphere.
Päivi Leino
doaj +1 more source
Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj +1 more source

