Results 91 to 100 of about 48,023,182 (329)
Secrecy Wireless Information and Power Transfer in OFDMA Systems
In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs).
Liu, Yuan, Zhang, Meng, Zhang, Rui
core +1 more source
A Study on the User Authentication Scheme with Forward Secrecy
Recently Wang-Li proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we described the Wang-Li and Yoon et al.`s authentication scheme simply, and we prove that the Wang-Li`s
openaire +2 more sources
ABSTRACT Background Neuromyelitis optica spectrum disorder (NMOSD) is a relapsing autoimmune disease of the central nervous system. High‐dose intravenous methylprednisolone (IVMP) is the standard first‐line therapy for acute attacks, although some patients remain refractory.
Wataru Horiguchi +5 more
wiley +1 more source
This paper covers secrecy from the vantage point of recent technological initiatives designed to detect cheating and deception in educational contexts as well as to monitor off-campus social media speech code violations.
Jo An Oravec
doaj
Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley +1 more source
Family Secrecy in Family Therapy Practice: An Explorative Focus Group Study
The aim of this focus group study was to explore the experiences of family therapists working with family secrecy. Our study highlights that family secrets present important and compelling challenges for family therapists. Furthermore, our study reveals that there seem to be some basic strategies family therapists use in dealing with these challenges ...
Deslypere, Eva, Rober, Peter
openaire +4 more sources
Killing Norms Softly: US Targeted Killing, Quasi-secrecy and the Assassination Ban
This article argues that when actors engage in controversial new security practices, it is misconceived to view secrecy as an opposed, counterproductive alternative to the pursuit of legitimation.
Andris Banka, Adam E. Quinn
semanticscholar +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Vehicle Communication using Secrecy Capacity
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang +17 more
core +1 more source

