Results 51 to 60 of about 175,312 (289)

Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks

open access: yesSensors, 2023
The paper studies the secrecy communication threatened by a single eavesdropper in Energy Harvesting (EH)-based cognitive radio networks, where both the Secure User (SU) and the jammer harvest, store, and utilize RF energy from the Primary Transmitter ...
Ruiquan Lin   +5 more
doaj   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Secure Transmission of Terahertz Signals with Multiple Eavesdroppers

open access: yesMicromachines, 2022
The terahertz (THz) band is expected to become a key technology to meet the ever-increasing traffic demand for future 6G wireless communications, and a lot of efforts have been paid to develop its capacity.
Yuqian He   +4 more
doaj   +1 more source

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

On the Zero-Outage Secrecy-Capacity of Dependent Fading Wiretap Channels

open access: yesEntropy, 2022
It is known that for a slow fading Gaussian wiretap channel without channel state information at the transmitter and with statistically independent fading channels, the outage probability of any given target secrecy rate is non-zero, in general.
Eduard Jorswieck   +2 more
doaj   +1 more source

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Covid Cover-up: Secrecy, Censorship and Suppression during the Pandemic

open access: yesSecrecy and Society
During the height of the COVID-19 pandemic, most health authorities, governments, and mass media organizations presented a single official view concerning lockdowns, masking, distancing, and vaccines.
Brian Martin
doaj   +1 more source

On Physically Secure and Stable Slotted ALOHA System [PDF]

open access: yes, 2009
In this paper, we consider the standard discrete-time slotted ALOHA with a finite number of terminals with infinite size buffers. In our study, we jointly consider the stability of this system together with the physical layer security.
Ercetin, Ozgur, Sarikaya, Yunus
core  

Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib

open access: yesMolecular Oncology, EarlyView.
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute   +17 more
wiley   +1 more source

Exploiting Opportunistic Scheduling Schemes to Improve Physical-Layer Security in MU-MISO NOMA Systems

open access: yesIEEE Access, 2019
This paper studies opportunistic scheduling schemes to enhance the secrecy performance in multi-user multiple-input single-output (MU-MISO) non-orthogonal multiple access (NOMA) systems, in which a multiple antenna base station (BS) serves multiple ...
Kyusung Shim   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy