Results 271 to 280 of about 48,023,182 (329)
Some of the next articles are maybe not open access.
Secrecy Performance of NOMA Systems With Energy Harvesting and Full-Duplex Relaying
IEEE Transactions on Vehicular Technology, 2020This paper studies the physical layer security for a cooperative non-orthogonal multiple access system with energy harvesting (EH) and full-duplex (FD) relaying.
Cheng Guo +4 more
semanticscholar +1 more source
IEEE Communications Letters, 2020
The problem of optimal power allocation between the information-bearing signal and the artificial noise (AN) signal is addressed in this letter to enhance the physical layer security of the multiple-input-single-output wiretap channel. Differing from the
Darui Hu +3 more
semanticscholar +1 more source
The problem of optimal power allocation between the information-bearing signal and the artificial noise (AN) signal is addressed in this letter to enhance the physical layer security of the multiple-input-single-output wiretap channel. Differing from the
Darui Hu +3 more
semanticscholar +1 more source
On the Study of Secrecy Capacity with Outdated CSI
2016In this paper, we study the secrecy capacity of the proposed transmission scheme. It is provided that the SNR at the selected best relay, destination and eavesdropper are same due to the symmetrical setup. The outage probability is considered here to evaluate the performance of such a secrecy communication system.
Tong Chen +3 more
openaire +1 more source
Perceived suicide stigma, secrecy about suicide loss and mental health outcomes
Death Studies, 2018Perceived suicide stigma and consequent secrecy about suicide loss could contribute to impaired mental health among suicide loss survivors. Using online survey data from 195 suicide loss survivors, higher perceived suicide stigma was associated with more
N. Oexle, W. Feigelman, Lindsay Sheehan
semanticscholar +1 more source
On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels [PDF]
Theoretical studies on physical layer security often adopt the secrecy outage probability as the performance metric for wireless communications over quasi-static fading channels.
Biao He +2 more
exaly +2 more sources
A prospective study of donor insemination recipients: secrecy, privacy, and disclosure
Fertility and Sterility, 1994To study prospectively the attitudes and behaviors of heterosexual couples undergoing donor insemination.Couples undergoing donor insemination completed psychological questionnaires before treatment regarding psychiatric symptoms, self-esteem, marital adjustment, and their attitudes about privacy or disclosure.Forty-one of 82 heterosexual couples ...
S C, Klock, M C, Jacob, D, Maier
openaire +2 more sources
The LGBTQ+ experience of secrecy: a comparative study of secrecy behaviour, ability, and attitude
Psychology & SexualitySecrecy, the intentional concealment of information from others, is a widespread phenomenon with important implications for mental health, relationships, and identity. While much research has examined the types of secrets people keep, little is known about how secrecy is experienced by LGBTQ+ individuals, for whom concealment may involve core aspects ...
Van der Hallen, Ruth +3 more
openaire +2 more sources
On the Outside Looking In: Secrecy and the Study of Authoritarian Regimes*
Social Science Quarterly, 2016ObjectiveThis study seeks to show how authoritarian secrecy complicates the reliable identification of the inner power configuration in dictatorships. This topic is relevant to recent research on autocratic regime subtypes and institutions.MethodsThe study pursues a theoretical and conceptual analysis of the implications of heteronomous structures of ...
openaire +1 more source
Case Study: Openness and Secrecy in Computer Research
Science, Technology, & Human Values, 1985The last 15 years have seen an explosive growth in university-based research activities in the fields of computer research and information theory. Technology has both driven and been driven by these activities. Development of the technology for very large-scale integration (VLSI), for example, has driven research on special purpose processors and ...
openaire +1 more source
Secrecy Characteristics With Assistance of Mixture Gamma Distribution
IEEE Wireless Communications Letters, 2019Considering the fact that the mixture gamma (MG) distribution is a general model that can be used to elaborate most well-known distributions, including small-scale, large-scale, and composite fadings, this letter studies the security issue when the ...
L. Kong, Georges Kaddoum
semanticscholar +1 more source

