Results 51 to 60 of about 134,321 (273)

Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints

open access: yesIEEE Access, 2020
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach   +3 more
doaj   +1 more source

Secrecy capacity region of Gaussian broadcast channel [PDF]

open access: yes2009 43rd Annual Conference on Information Sciences and Systems, 2009
In this paper, we first consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-taper also receives the transmitted signal. We assume that the signals are transmitted over additive white Gaussian noise channels. We characterize the secrecy capacity region of this channel.
Ghadamali Bagherikaram   +2 more
openaire   +1 more source

Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley   +1 more source

On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels

open access: yes, 2017
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since polar codes are capacity achieving codes with low encoding-decoding complexity and they can approach perfect secrecy rates ...
Aram, Siamak   +3 more
core   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security ...
Long Kong   +5 more
doaj   +1 more source

Multi-Antenna Gaussian Broadcast Channels with Confidential Messages

open access: yes, 2008
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks.
Liu, Ruoheng, Poor, H. Vincent
core   +1 more source

Risk Prediction Models for Recurrence After Curative Treatment of Early‐Stage or Locally Advanced Lung Cancer: A Systematic Review

open access: yesAging and Cancer, EarlyView.
This systematic review synthesizes prognostic models for survival and recurrence in resected non‐small cell lung cancer. While many models demonstrate moderate to good discrimination, few are externally validated and reporting quality is variable, limiting clinical applicability and highlighting the need for robust, transparent model development ...
Evangeline Samuel   +4 more
wiley   +1 more source

Some New Results on the Wiretap Channel with Side Information

open access: yesEntropy, 2012
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side ...
Yuan Luo, Bin Dai
doaj   +1 more source

RIS-Aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis With Simultaneous Eavesdropping

open access: yesIEEE Access, 2023
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy