Results 41 to 50 of about 48,023,182 (329)
Wage Theft, Secrecy, and Derealization of ‘Ideal Workers’ in the Bangladesh Garment Industry
This study addresses how violence is mobilized through wage theft in feminized workplaces thriving within the global value chain. Guided by Judith Butler’s concept of derealization, this longitudinal case study on the Bangladesh garment industry advances
Shoaib Ahmed
semanticscholar +1 more source
Secrecy Analysis and Learning-Based Optimization of Cooperative NOMA SWIPT Systems [PDF]
Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block.
Furqan Jameel +4 more
semanticscholar +1 more source
Physical Layer Security in Millimeter Wave Cellular Networks
Recent researches show that millimeter wave (mmWave) communications can offer orders of magnitude increases in the cellular capacity. However, the secrecy performance of a mmWave cellular network has not been investigated so far.
Wang, Chao, Wang, Hui-Ming
core +1 more source
Secure Massive MIMO Transmission in the Presence of an Active Eavesdropper [PDF]
In this paper, we investigate secure and reliable transmission strategies for multi-cell multi-user massive multiple-input multiple-output (MIMO) systems in the presence of an active eavesdropper.
Caire, Giuseppe +4 more
core +3 more sources
The public enactment of secrecy is part of the Spanish Golden Age culture. This article presents a research project, which pursues three objectives: A study of secrecy as a core characteristic of Spanish Golden Age culture, on the basis of ...
Wolfram Aichinger, Simon Kroll
doaj +1 more source
Robust Power Allocation and Outage Analysis for Secrecy in Independent Parallel Gaussian Channels
This letter studies parallel independent Gaussian channels with uncertain eavesdropper channel state information (CSI). Firstly, we evaluate the probability of zero secrecy rate in this system for (i) given instantaneous channel conditions and (ii) a ...
Kandhway, Kundan +2 more
core +1 more source
Secrecy is common, yet we know little about how it plays out in daily life. Most existing research on secrecy is based on methods involving retrospection over long periods of time, failing to capture secrecy “in the wild.” Filling this gap, we conducted ...
V. Bianchi +4 more
semanticscholar +1 more source
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
This paper studies the physical layer security issue for cognitive radio sensor networks (CRSNs) with primary outage constraint, for which a tractable framework is developed to analyze the secrecy performance for CRSNs related to the random channel ...
Hongyu Ma +4 more
doaj +1 more source
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by ...
Han, Zhu +4 more
core +1 more source
Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization [PDF]
Consider an MISO channel overheard by multiple eavesdroppers. Our goal is to design an artificial noise (AN)-aided transmit strategy, such that the achievable secrecy rate is maximized subject to the sum power constraint. AN-aided secure transmission has
Li, Qiang, Ma, Wing-Kin
core +1 more source

