Results 71 to 80 of about 275,240 (330)

Sum Capacity-Based Modeling and Secrecy Analysis of MISO-NOMA Cooperative IoT Framework

open access: yesIEEE Open Journal of the Communications Society
Non-orthogonal multiple access (NOMA) has emerged as an effective technology, aiding in latency reduction, improving security and reliability, and enhancing the spectral efficiency and capacity in Internet of Things (IoT)-enabled communication systems ...
Naeem Uz Zaman   +4 more
doaj   +1 more source

“Inside His Idiom:” E. M. Forster’s T. S. Eliot

open access: yesE-REA, 2018
Counter to previous assumptions, relations between E.M. Forster and T.S. Eliot are important to an understanding of the work of each, and reshape our view of their period.
Jason FINCH
doaj   +1 more source

Linear Precoding for Broadcast Channels with Confidential Messages under Transmit-Side Channel Correlation

open access: yes, 2013
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y.   +3 more
core   +1 more source

Gridded UAV Swarm for Secrecy Rate Maximization with Unknown Eavesdropper [PDF]

open access: green, 2021
Christantus O. Nnamani   +2 more
openalex   +1 more source

Evolutionary dynamics of the chloroplast genome in Daphne (Thymelaeaceae): comparative analysis with related genera and insights into phylogenetics

open access: yesFEBS Open Bio, EarlyView.
Comparative analysis of chloroplast genomes from 14 genera of Thymelaeaceae revealed variation in gene content, ranging from 128 to 142 genes, primarily influenced by IR expansion/contraction events and pseudogenization of ndhF, ndhI, and ndhG. Two large inversions were detected within the large single‐copy region, including a synapomorphic inversion ...
Abdullah   +8 more
wiley   +1 more source

Finite-Blocklength Bounds for Wiretap Channels

open access: yes, 2016
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and converse bounds are derived, which are shown to be tighter than existing bounds.
Poor, H. Vincent   +2 more
core   +1 more source

The photoswitchable cannabinoid azo‐HU308 enables optical control of Ca2+ dynamics in INS‐1 β‐cells via off‐target effects on TRPC channels

open access: yesFEBS Open Bio, EarlyView.
Light activation of the photoswitchable cannabinoid ligand azo‐HU308 triggers Ca2+ influx in pancreatic β‐cells through TRPC channels, independent of CB2 cannabinoid receptors. This reveals a non‐GPCR pathway for cannabinoid modulation of β‐cell Ca2+ dynamics and establishes azo‐HU308 as an optical tool to study cannabinoid signaling through TRP ...
Alexander E. G. Viray, James A. Frank
wiley   +1 more source

On the Secrecy Capacity of Fading Channels

open access: yes, 2006
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El   +2 more
core   +2 more sources

KLK7 overexpression promotes an aggressive phenotype and facilitates peritoneal dissemination in colorectal cancer cells

open access: yesFEBS Open Bio, EarlyView.
KLK7, a tissue kallikrein‐related peptidase, is elevated in advanced colorectal cancer and associated with shorter survival. High KLK7 levels in ascites correlate with peritoneal metastasis. In mice, KLK7 overexpression increases metastasis. In vitro, KLK7 enhances cancer cell proliferation, migration, adhesion, and spheroid formation, driving ...
Yosr Z. Haffani   +6 more
wiley   +1 more source

Public Health Versus Court-Sponsored Secrecy [PDF]

open access: yes, 2006
Public health practice relies on access to information. Givelber and Robbins discuss the debate about court-sponsored secrecy: Whether or not courts should tolerate, edorse, or protect secrecy when the sequestered information might help protect the ...
Givelber, Daniel J., Robbins, Anthony
core   +1 more source

Home - About - Disclaimer - Privacy