Results 81 to 90 of about 306,585 (324)

Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes

open access: yesIEEE Journal on Selected Areas in Communications, 2018
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of
Yongxu Zhu, G. Zheng, M. Fitch
semanticscholar   +1 more source

Linear Precoding for Broadcast Channels with Confidential Messages under Transmit-Side Channel Correlation

open access: yes, 2013
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y.   +3 more
core   +1 more source

Enzymatic and microbial routes to bioplastics: The green chemistry frontier of biopolymers

open access: yesFEBS Open Bio, EarlyView.
Microbial biosynthesis and engineered enzyme platforms are expanding the design space of polyhydroxyalkanoate bioplastics. By combining fermentation, PHA synthase engineering and cell‐free modular systems, tailored biodegradable polymers can be produced with tunable properties, supporting more sustainable materials and future circular bioeconomy ...
Giovanni Gallo   +4 more
wiley   +1 more source

The Importance of Being a Good Employee: Georg Everhard Rumphius, the Dutch East India Company, and Knowledge in the Late Seventeenth Century

open access: yesEarly Modern Low Countries, 2019
This article analyses the complex interrelation between the VOC and scholarship by investigating the relationship between the Company and Georg Everhard Rumphius (1627-1702).
Susanne Friedrich
doaj   +1 more source

Anticipated Suicide Stigma, Secrecy, and Suicidality among Suicide Attempt Survivors.

open access: yesSuicide and Life-Threatening Behaviour, 2020
OBJECTIVE Suicidal behavior is stigmatized, and suicide attempt survivors often keep their experiences secret. Although secrecy can protect from discrimination, research from related fields suggests that both the experience of stigma and secrecy can ...
LeAnn J. Mayer   +6 more
semanticscholar   +1 more source

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]

open access: yes, 2015
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin   +5 more
core   +1 more source

Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks

open access: yes, 2015
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili   +5 more
core   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages

open access: yesEntropy, 2019
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy