Results 71 to 80 of about 139,119 (288)
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary.
Yahya M. Al-Moliki +3 more
doaj +1 more source
Optimization Method for Physical Layer Secure Communication in SWIPT MIMO Full-Duplex System [PDF]
This paper studies the security problem in the Multiple-Input Multiple-Output(MIMO) communication system when the transmission of wireless information and power happens simultaneously.We first design the energy partitioning factors of the artificial ...
CHEN Keke, ZHAO Sai, TANG Dong
doaj +1 more source
Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper.
Bhargava, Vijay K. +2 more
core +1 more source
Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute +17 more
wiley +1 more source
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin +5 more
core +1 more source
Optimal Beamforming for Gaussian MIMO Wiretap Channels with Two Transmit Antennas
A Gaussian multiple-input multiple-output wiretap channel in which the eavesdropper and legitimate receiver are equipped with arbitrary numbers of antennas and the transmitter has two antennas is studied in this paper.
Poor, H. Vincent +2 more
core +1 more source
On the secrecy rate region for the interference channel
This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users
Koyluoglu, O. Ozan, Gamal, Hesham El
openaire +2 more sources
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg +43 more
wiley +1 more source
Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers from unreliability. This paper studies the secrecy performance of a relay network with such unreliable wireless backhaul.
Cheng Yin +5 more
doaj +1 more source
Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the ...
Chockalingam, A., Vishwakarma, Sanjay
core +1 more source

