Results 71 to 80 of about 48,023,182 (329)
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee +9 more
wiley +1 more source
This paper studies opportunistic scheduling schemes to enhance the secrecy performance in multi-user multiple-input single-output (MU-MISO) non-orthogonal multiple access (NOMA) systems, in which a multiple antenna base station (BS) serves multiple ...
Kyusung Shim +2 more
doaj +1 more source
Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while ...
Zhihui Shang +6 more
doaj +1 more source
In "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies," Ma Vang deftly answers the question of how one can “recount a history that has systematically been kept secret” by centering Hmong refugees as sources of knowledge and ...
Aline Lo
doaj +1 more source
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A. +3 more
core +1 more source
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti +12 more
wiley +1 more source
As the verse chosen as a title for this article emblematically shows, esoteric movements have consistently used secrecy as a literary topos in their oral and written cultural expressions for a number of purposes.
Carola Erika Lorea
doaj +1 more source
Secrecy's subjects: Special operators in the US shadow war
This article sets out a framework for studying the power of secrecy in security discourses. To date, the interplay between secrecy and security has been explored within security studies most often through a framing of secrecy and security as a ‘balancing’
Elspeth Van Veeren
semanticscholar +1 more source
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego +10 more
wiley +1 more source
Improved Hybrid Precoder Design for Secure mmWave MIMO Communications
Key challenges of emerging mobile communication systems are to provide higher data rates, diverse device connectivity, low latency, higher system capacity, and low energy consumption. The communication systems exploiting the millimeter-wave (mmWave) band
Yasin Kabalci, Muhammad Ali
doaj +1 more source

