Results 51 to 60 of about 134,321 (273)
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach +3 more
doaj +1 more source
Secrecy capacity region of Gaussian broadcast channel [PDF]
In this paper, we first consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-taper also receives the transmitted signal. We assume that the signals are transmitted over additive white Gaussian noise channels. We characterize the secrecy capacity region of this channel.
Ghadamali Bagherikaram +2 more
openaire +1 more source
Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley +1 more source
On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since polar codes are capacity achieving codes with low encoding-decoding complexity and they can approach perfect secrecy rates ...
Aram, Siamak +3 more
core +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security ...
Long Kong +5 more
doaj +1 more source
Multi-Antenna Gaussian Broadcast Channels with Confidential Messages
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks.
Liu, Ruoheng, Poor, H. Vincent
core +1 more source
This systematic review synthesizes prognostic models for survival and recurrence in resected non‐small cell lung cancer. While many models demonstrate moderate to good discrimination, few are externally validated and reporting quality is variable, limiting clinical applicability and highlighting the need for robust, transparent model development ...
Evangeline Samuel +4 more
wiley +1 more source
Some New Results on the Wiretap Channel with Side Information
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side ...
Yuan Luo, Bin Dai
doaj +1 more source
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman +5 more
doaj +1 more source

