Results 81 to 90 of about 48,023,182 (329)
On Physically Secure and Stable Slotted ALOHA System [PDF]
In this paper, we consider the standard discrete-time slotted ALOHA with a finite number of terminals with infinite size buffers. In our study, we jointly consider the stability of this system together with the physical layer security.
Ercetin, Ozgur, Sarikaya, Yunus
core
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can
Chen, Zhi +3 more
core +1 more source
ABSTRACT Background Sickle cell disease (SCD) is a chronic, inherited hemoglobinopathy that requires frequent hospitalization for disease‐related complications. Canadian data on inpatient care is limited. This study compared caregiver‐reported hospital experiences of children with SCD to those with cystic fibrosis (CF), a chronic, autosomal recessive ...
Hailey M. Zwicker +11 more
wiley +1 more source
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich +5 more
wiley +1 more source
Ethnographic Research in the U.S. Intelligence Community: Opportunities and Challenges [PDF]
This article considers lessons learned from conducting research inside the intelligence community. Drawing on a year of ethnographic field work and interviews at the National Counterterrorism Center, I show that “boundary personnel”- people who navigate ...
Nolan, Bridget
core +1 more source
Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A. +3 more
core +1 more source
This article offers a sociological account of how we might analyse the relationship between contemporary practices and discourses of secrecy on the one hand, and those of transparency on the other hand.
Anne M. Cronin
semanticscholar +1 more source
ABSTRACT Background Wilms tumor (WT) treatment imposes a significant time burden on patients and their families. Time toxicity is a patient‐centered metric that quantifies the burden of healthcare interaction. We sought to define time toxicity in the first year after diagnosis of WT and hypothesized that it would increase as tumor stage and treatment ...
Caleb Q. Ashbrook +6 more
wiley +1 more source
To improve the secrecy performance of cellular-enabled unmanned aerial vehicle (UAV) communication networks, this paper proposes an aerial cooperative jamming scheme and studies its optimal design to achieve the maximum average secrecy rate. Specifically,
Hanming Sun +4 more
doaj +1 more source
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley +1 more source

