Results 51 to 60 of about 9,853 (272)
Artificial-Noise-Aided Secure Multi-Antenna Transmission with Limited Feedback
We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver.
Heath Jr, Robert W. +3 more
core +1 more source
Implantable optoelectrical devices are an effective resource for the modulation and monitoring of neural activity with high spatiotemporal resolution. This review discusses current challenges faced by these devices and outlines future perspectives for the development of next‐generation neural interfaces targeting chronic, multisite, and multimodal ...
Stella Aslanoglou +4 more
wiley +1 more source
In this paper, the physical layer security (PLS) analysis for a decode-and-forward (DF) protocol based multi-hop hybrid radio frequency (RF)/ free space optics (FSO) is presented.
Dipti R. Pattanayak +4 more
doaj +1 more source
Exploiting Uplink NOMA to Improve Sum Secrecy Throughput in IoT Networks
This paper exploits nonorthogonal multiple access (NOMA) to enhance the uplink secure transmission in Internet of Things (IoT) networks. Considering the different intercept ability of eavesdroppers (Eve), secrecy performances of both strong and weak Eve wiretap scenarios have been investigated. In strong Eve wiretap scenario (SWS), Eve is assumed to be
Zhongwu Xiang +5 more
openaire +1 more source
We developed a fully human 3D tonsil cell culture system incorporating supportive stromal cells that better sustains and activates immune cells than conventional methods. The model generates stronger, more targeted antibody responses to viral antigens and vaccines, providing a physiologically relevant and entirely human platform for studying immune ...
Maaike V. J. Braham +11 more
wiley +1 more source
SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang +4 more
doaj +1 more source
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang +4 more
doaj +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang +4 more
doaj +1 more source

