Results 81 to 90 of about 306,585 (324)
Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of
Yongxu Zhu, G. Zheng, M. Fitch
semanticscholar +1 more source
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y. +3 more
core +1 more source
Enzymatic and microbial routes to bioplastics: The green chemistry frontier of biopolymers
Microbial biosynthesis and engineered enzyme platforms are expanding the design space of polyhydroxyalkanoate bioplastics. By combining fermentation, PHA synthase engineering and cell‐free modular systems, tailored biodegradable polymers can be produced with tunable properties, supporting more sustainable materials and future circular bioeconomy ...
Giovanni Gallo +4 more
wiley +1 more source
This article analyses the complex interrelation between the VOC and scholarship by investigating the relationship between the Company and Georg Everhard Rumphius (1627-1702).
Susanne Friedrich
doaj +1 more source
Anticipated Suicide Stigma, Secrecy, and Suicidality among Suicide Attempt Survivors.
OBJECTIVE Suicidal behavior is stigmatized, and suicide attempt survivors often keep their experiences secret. Although secrecy can protect from discrimination, research from related fields suggests that both the experience of stigma and secrecy can ...
LeAnn J. Mayer +6 more
semanticscholar +1 more source
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin +5 more
core +1 more source
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili +5 more
core +1 more source
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
Network Localization of Fatigue in Multiple Sclerosis
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo +12 more
wiley +1 more source
Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song +4 more
doaj +1 more source

