Results 51 to 60 of about 6,150 (302)
This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states.
Shlomo Shamai (Shitz) +3 more
doaj +2 more sources
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman +5 more
doaj +1 more source
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu +14 more
wiley +1 more source
Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito +14 more
wiley +1 more source
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and many receivers in the presence of an eavesdropper for several special classes of broadcast channels.
Ersen Ekrem, Sennur Ulukus
doaj +2 more sources
Some New Results on the Wiretap Channel with Side Information
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side ...
Yuan Luo, Bin Dai
doaj +1 more source
This letter is concerned with the physical layer security of the cooperative vehicular relay network where a source vehicle communicates with a destination vehicle via both a direct link in the presence of a location‐uncertain eavesdropping vehicle and ...
Shanchuan Huang +4 more
doaj +1 more source
Abstract The secure transmission problem of MIMO wireless system in fading channels is studied in this paper. We add a secrecy capacity optimization artificial noise(SCO-AN) to the transported signal for improving the security performance of the system. The closed-form expression of secrecy capacity's lower bound is obtained. Base on the closed-
Yebo Gu +3 more
openaire +1 more source
Secrecy Capacity Maximization for a Hybrid Relay-RIS Scheme in mmWave MIMO Networks [PDF]
Edson Nobuyuki Egashira +3 more
openalex +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source

