Results 61 to 70 of about 141,592 (289)

Signaling in Secret: Pay-for-Performance and the Incentive and Sorting Effects of Pay Secrecy [PDF]

open access: yes, 2014
Key Findings: Pay secrecy adversely impacts individual task performance because it weakens the perception that an increase in performance will be accompanied by increase in pay; Pay secrecy is associated with a decrease in employee performance and ...
Adams J. S.   +112 more
core   +2 more sources

On secrecy performance of industrial Internet of things [PDF]

open access: yesInternet Technology Letters, 2018
Physical layer security has been shown to hold promise as a new paradigm for securing wireless links. This paper provides secrecy performance analysis for industrial Internet of things, where a set of industrial devices communicates in the presence of eavesdropper under a Weibull fading environment. We derive a closed‐form expression for secrecy outage
Furqan Jameel   +3 more
openaire   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping

open access: yesIEEE Access, 2020
In this paper we study the secrecy performance of a downlink massive multiple-input multiple-output (MIMO) system in the presence of pilot spoofing attack (PSA). Specifically, the base station (BS), which is equipped with low-resolution analog-to-digital
Qian Xu, Pinyi Ren
doaj   +1 more source

Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks

open access: yes, 2015
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili   +5 more
core   +1 more source

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise

open access: yes, 2019
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A.   +3 more
core   +1 more source

Gut microbiota diversity is prognostic in metastatic hormone receptor‐positive breast cancer patients receiving chemotherapy and immunotherapy

open access: yesMolecular Oncology, EarlyView.
In this exploratory study, we investigated the relationship between the gut microbiota and outcome in patients with metastatic hormone receptor‐positive breast cancer, treated in a randomized clinical trial with chemotherapy alone or chemotherapy in combination with immune checkpoint blockade.
Andreas Ullern   +7 more
wiley   +1 more source

PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL [PDF]

open access: yesICTACT Journal on Communication Technology, 2014
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical ...
Vaibhav Kumar Gupta, Poonam Jindal
doaj  

Exploiting Secrecy Performance of Uplink NOMA in Cellular Networks

open access: yesIEEE Access, 2021
We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with single antenna and multi-antenna users in presence of an eavesdropper. Two phases are required for communications during each time frame between the users and the base
Minh-Sang Van Nguyen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy