Results 71 to 80 of about 139,119 (288)

Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions

open access: yesPhotonics
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary.
Yahya M. Al-Moliki   +3 more
doaj   +1 more source

Optimization Method for Physical Layer Secure Communication in SWIPT MIMO Full-Duplex System [PDF]

open access: yesJisuanji gongcheng, 2019
This paper studies the security problem in the Multiple-Input Multiple-Output(MIMO) communication system when the transmission of wireless information and power happens simultaneously.We first design the energy partitioning factors of the artificial ...
CHEN Keke, ZHAO Sai, TANG Dong
doaj   +1 more source

Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise

open access: yes, 2016
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper.
Bhargava, Vijay K.   +2 more
core   +1 more source

Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib

open access: yesMolecular Oncology, EarlyView.
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute   +17 more
wiley   +1 more source

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]

open access: yes, 2015
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin   +5 more
core   +1 more source

Optimal Beamforming for Gaussian MIMO Wiretap Channels with Two Transmit Antennas

open access: yes, 2017
A Gaussian multiple-input multiple-output wiretap channel in which the eavesdropper and legitimate receiver are equipped with arbitrary numbers of antennas and the transmitter has two antennas is studied in this paper.
Poor, H. Vincent   +2 more
core   +1 more source

On the secrecy rate region for the interference channel

open access: yes2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008
This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users
Koyluoglu, O. Ozan, Gamal, Hesham El
openaire   +2 more sources

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections

open access: yesIEEE Access, 2018
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers from unreliability. This paper studies the secrecy performance of a relay network with such unreliable wireless backhaul.
Cheng Yin   +5 more
doaj   +1 more source

Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input

open access: yes, 2014
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the ...
Chockalingam, A., Vishwakarma, Sanjay
core   +1 more source

Home - About - Disclaimer - Privacy