Results 51 to 60 of about 139,758 (194)
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels [PDF]
In this paper we consider the robust secure beamformer design for MISO wiretap channels. Assume that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and secrecy ...
Hong, Mingyi +4 more
core
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili +5 more
core +1 more source
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system.
Xianyu Zhang +3 more
doaj +1 more source
In this paper, a cooperative orthogonal frequency division multiplexing system with multiple untrusted amplify‐and‐forward relays is considered. Since there exists no direct link between source and user because of the shadowing effect, a positive system ...
Yifeng Jin +4 more
doaj +1 more source
Secrecy Performance of a Multi-NOMA-MIMO System in the UEH Relaying Network Using the PSO Algorithm
In this paper, we investigate the secrecy performance of the nonorthogonal multiple access (NOMA) system in an untrusted relaying energy harvesting (UEH) network with the multiple-input multiple-output (MIMO) architecture using the maximum ratio ...
Thi Le Anh, Ic Pyo Hong
doaj +1 more source
Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A. +3 more
core +1 more source
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee +9 more
wiley +1 more source
DDPG Optimization for Hybrid RIS-Assisted Secure Multi-User-MISO Networks
This paper investigates a Deep Reinforcement Learning (DRL) based optimization framework for secure communications in hybrid reconfigurable intelligent surface (RIS)-assisted multi-user multiple-input single-output (MU-MISO) systems.
Muhammad Iqbal +7 more
doaj +1 more source
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y. +3 more
core +1 more source

