Results 61 to 70 of about 141,592 (289)
Signaling in Secret: Pay-for-Performance and the Incentive and Sorting Effects of Pay Secrecy [PDF]
Key Findings: Pay secrecy adversely impacts individual task performance because it weakens the perception that an increase in performance will be accompanied by increase in pay; Pay secrecy is associated with a decrease in employee performance and ...
Adams J. S. +112 more
core +2 more sources
On secrecy performance of industrial Internet of things [PDF]
Physical layer security has been shown to hold promise as a new paradigm for securing wireless links. This paper provides secrecy performance analysis for industrial Internet of things, where a set of industrial devices communicates in the presence of eavesdropper under a Weibull fading environment. We derive a closed‐form expression for secrecy outage
Furqan Jameel +3 more
openaire +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping
In this paper we study the secrecy performance of a downlink massive multiple-input multiple-output (MIMO) system in the presence of pilot spoofing attack (PSA). Specifically, the base station (BS), which is equipped with low-resolution analog-to-digital
Qian Xu, Pinyi Ren
doaj +1 more source
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili +5 more
core +1 more source
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source
Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A. +3 more
core +1 more source
In this exploratory study, we investigated the relationship between the gut microbiota and outcome in patients with metastatic hormone receptor‐positive breast cancer, treated in a randomized clinical trial with chemotherapy alone or chemotherapy in combination with immune checkpoint blockade.
Andreas Ullern +7 more
wiley +1 more source
PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL [PDF]
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical ...
Vaibhav Kumar Gupta, Poonam Jindal
doaj
Exploiting Secrecy Performance of Uplink NOMA in Cellular Networks
We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with single antenna and multi-antenna users in presence of an eavesdropper. Two phases are required for communications during each time frame between the users and the base
Minh-Sang Van Nguyen +4 more
doaj +1 more source

