Results 71 to 80 of about 139,758 (194)
Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley +1 more source
Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A K-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers.
Elmira Shahraki +2 more
doaj +1 more source
Wiretap Channel with Information Embedding on Actions
Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver.
Xinxing Yin, Zhi Xue
doaj +1 more source
Multi-Antenna Gaussian Broadcast Channels with Confidential Messages
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks.
Liu, Ruoheng, Poor, H. Vincent
core +1 more source
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary.
Yahya M. Al-Moliki +3 more
doaj +1 more source
Optimization Method for Physical Layer Secure Communication in SWIPT MIMO Full-Duplex System [PDF]
This paper studies the security problem in the Multiple-Input Multiple-Output(MIMO) communication system when the transmission of wireless information and power happens simultaneously.We first design the energy partitioning factors of the artificial ...
CHEN Keke, ZHAO Sai, TANG Dong
doaj +1 more source
Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wire-tap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna.
Liu, Nan +2 more
core +2 more sources
On the secrecy rate region for the interference channel
This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users
Koyluoglu, O. Ozan, Gamal, Hesham El
openaire +2 more sources
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin +5 more
core +1 more source
Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S. +3 more
core +1 more source

