To see the other types of publications on this topic, follow the link: Strictly positive secure capacity.

Journal articles on the topic 'Strictly positive secure capacity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Strictly positive secure capacity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chi-Bao, Le, and Do Dinh-Thuan. "Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access." Bulletin of Electrical Engineering and Informatics 10, no. 2 (2021): 848~855. https://doi.org/10.11591/eei.v10i2.2117.

Full text
Abstract:
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.
APA, Harvard, Vancouver, ISO, and other styles
2

Le, Chi-Bao, and Dinh-Thuan Do. "Studying strictly positive secure capacity in cognitive radio-based non-orthogonal multiple access." Bulletin of Electrical Engineering and Informatics 10, no. 2 (2021): 848–55. http://dx.doi.org/10.11591/eei.v10i2.2117.

Full text
Abstract:
This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.
APA, Harvard, Vancouver, ISO, and other styles
3

Anastasov, Jelena, Aleksandra Panajotović, Dejan Milić, and Daniela Milović. "PERFORMANCE OF SECURE COMMUNICATION OVER LAMBDA-FISHER-SNEDECOR FADING CHANNELS." Facta Universitatis, Series: Automatic Control and Robotics 1, no. 2 (2022): 117. http://dx.doi.org/10.22190/fuacr220830010a.

Full text
Abstract:
In this paper, we investigate the physical layer security (PLS) of the traditional Wyner’s wiretap channel model. Secrecy performance analysis is performed assuming a presence of an active eavesdropper trying to overhear the confidential data transmission from the source node to the predefined destination. In what follows, we derive the lower bound of the secrecy outage probability, the strictly positive secrecy capacity as well as the average secrecy capacity, over the composite a-Fisher-Snedecor (a-F) fading environment. According to the analytical results, numerical results are also shown. The impact of the path loss component, the average signal-to-noise ratios over the main/wiretap channel as well as the impact of the fading, the non-linearity of the propagation medium and the shadowing shaping parameter on the PLS metrics is examined. The overall analysis and the obtained results have a high level of generality and also a high level of applicability since the a-F distribution was recently proposed, as the best fit distribution for the channel characterization of the device-to-device wireless communication in the future Beyond 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Dinh-Thuan, Do, and Van Nguyen Minh-Sang. "Secure transmission for uplink and downlink non-orthogonal multiple access system with imperfect channel state information." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 4 (2022): 699–706. https://doi.org/10.12928/telkomnika.v20i4.20934.

Full text
Abstract:
In this paper, we design a secure transmission scheme in uplink and downlink of nonorthogonal multiple access (NOMA) system. In this scenario, two pairs of base stationuser can operate under the presence of eavesdropper. The relay plays an important role to forward signals from group of base stations to serve distant users. However, the eavesdropper can overhear signal which leads to secure performance need be reconsidered. To provide secure performance, we derive the closed-form expressions for strictly positive secrecy capacity (SPSC). In addition, we rely on relay for enlarge coverage area. The channel conditions meet imperfect channel state information (CSI) which shows degraded secure performance. Results confirm the relationship between transmit power at the source and and SPSC how many main parameters affecting secure performance metric. Furthermore, simulation results show that the uplink and downlink NOMA technique improves secure performance in the low SPSC region. We further conduct analysis by using Monte-Carlo simulations.
APA, Harvard, Vancouver, ISO, and other styles
5

Do, Dinh-Thuan, Minh-Sang Van Nguyen, Thi-Anh Hoang, and Miroslav Voznak. "NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement." Sensors 19, no. 3 (2019): 736. http://dx.doi.org/10.3390/s19030736.

Full text
Abstract:
In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as employing an emerging multiple access scheme, namely non-orthogonal multiple access (NOMA). This paper proposes a new scheme to consider secure performance, to be called relay selection NOMA (RS-NOMA). In particular, we consider metrics to evaluate secure performance in such an RS-NOMA system where a base station (master node in IoT) sends confidential messages to two main sensors (so-called NOMA users) under the influence of an external eavesdropper. In the proposed IoT scheme, both two NOMA sensors and an illegal sensor are served with different levels of allocated power at the base station. It is noticed that such RS-NOMA operates in two hop transmission of the relaying system. We formulate the closed-form expressions of secure outage probability (SOP) and the strictly positive secure capacity (SPSC) to examine the secrecy performance under controlling setting parameters such as transmit signal-to-noise ratio (SNR), the number of selected relays, channel gains, and threshold rates. The different performance is illustrated as performing comparisons between NOMA and orthogonal multiple access (OMA). Finally, the advantage of NOMA in secure performance over orthogonal multiple access (OMA) is confirmed both analytically and numerically.
APA, Harvard, Vancouver, ISO, and other styles
6

Dang, Huu-Phuc, Minh-Sang Van Nguyen, Dinh-Thuan Do, Minh-Hoa Nguyen, Minh-Triet Pham, and Anh-Tuan Kim. "Secure Performance Analysis of Aerial RIS-NOMA-Aided Systems: Deep Neural Network Approach." Electronics 11, no. 16 (2022): 2588. http://dx.doi.org/10.3390/electronics11162588.

Full text
Abstract:
The next generation of wireless systems has benefits in terms of spectrum and energy inefficiencies by exploiting two promising techniques including Non-Orthogonal Multiple Access (NOMA) and Reconfigurable Intelligent Surfaces (RIS). The scenario of two legitimate users existing together with an eavesdropper is worth examining in terms of secure matter while enabling machine learning tools at the base station for expected improvement. The base station deals with a highly complicated algorithm to adjust parameters against the attack of eavesdroppers and to better improve the secure performance of mobile users. This paper suggests a better solution to allow the base station to predict performance at destinations to adjust necessary parameters such as power allocation coefficients properly. To this end, we propose a deep neural network (DNN)-based approach which also leverages the benefits of aerial RIS to achieve predictable performance and significant secure performance improvement could be enhanced. We first derive the formulations for security outage probability (SOP) in closed-form expressions and analyze the strictly positive secrecy capacity (SPSC), which are crucial performance metrics to determine how the systems are against the existence of eavesdroppers. Such eavesdroppers intend to overhear signal transmission dedicated to intended users and incur degraded system performance. The numerical simulations are expected to evaluate how the machine learning tool works with the traditional computation of system performance metrics which is able to be verified by comparing with the Monte-Carlo method. Our numerical simulations demonstrate that the design of a higher number of meta-surface elements at the RIS, as well as a higher signal-to-noise ratio (SNR) levels at the base station, are key parameters to achieving improved security performance for users. For detailed guidelines of the RIS-NOMA aided system, we provide a table of parameters samples resulting in secure performance as expected.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Junxia, Hui Zhao та Michael Johnson. "Secrecy Performance Analysis of a Cognitive Network for IoT over k - μ Channels". Wireless Communications and Mobile Computing 2021 (26 червня 2021): 1–12. http://dx.doi.org/10.1155/2021/5548428.

Full text
Abstract:
With the development of Internet of Things (IoTs), devices are now connecting and communicating together on a heretofore unheard-of scale, forming huge heterogeneous networks of mobile IoT-enabled devices. For beyond 5G- (B5G-) enabled networks, this raises concerns in terms of spectral resource allocation and associated security. Cognitive radio is one effective solution to such a spectrum sharing issue which can be adopted to these B5G networks, which works on the principle of sharing spectrum between primary and secondary users. In this paper, we develop the confidentiality of cognitive radio network (CRNs) for IoT over k - μ fading channels, with the information transmitted between secondary networks with multiple cooperative eavesdroppers, under the constraint of the maximum interference that the primary users can tolerate. All considered facilities use a single-antenna receiver. Of particular interest, the minimum limit values of secure outage probability (SOP) and the probability of strictly positive secrecy capacity (SPSC) are developed for this model in a concise form. Finally, the Monte Carlo simulations for the system are provided to support the theoretical analysis presented.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Sheng-Hong, Rong-Rong Lu, Xian-Tao Fu, An-Ling Tong, and Jin-Yuan Wang. "Physical-Layer Security Analysis over M-Distributed Fading Channels." Entropy 21, no. 10 (2019): 998. http://dx.doi.org/10.3390/e21100998.

Full text
Abstract:
In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Jiangfeng, Zhisong Bie, Hongxia Bie, Pengfei He, and Machao Jin. "Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8842012.

Full text
Abstract:
At present, the fifth generation (5G) communication networks are in the time of large-scale deployment principally because its characteristics consists of large bandwidth, fast response, and high stability. As a partner of 5G, the Internet of Things (IoT) involves billions of devices around the world, which can make the wireless communication environment more intelligent and convenient. However, the problem that cannot be ignored is the physical layer security of 5G-IoT networks. Based on this, we perform a security analysis of cognitive radio networks (CRN) for IoT, where the CRN is the single-input multiple-output (SIMO) model experiencing κ-μ shadowed fading with multiple eavesdroppers. To analyze the confidentiality of the system under consideration, we analyze the security performance for the considered IoT systems with the help of the derived secure outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). As a verification of the theoretical formula, Monte Carlo simulation is also provided. The results of great interest are the factors that can produce better security performance in high SNRs region which consist of smaller M, smaller k, and larger N, and larger μ, smaller IP, and smaller Rth.
APA, Harvard, Vancouver, ISO, and other styles
10

Nguyen, Nhan Duc, Minh-Sang Van Nguyen, and Munyaradzi Munochiveyi. "Empowering Reconfigurable Intelligent Surfaces for Security of Downlink NOMA." Wireless Communications and Mobile Computing 2022 (May 25, 2022): 1–15. http://dx.doi.org/10.1155/2022/1498918.

Full text
Abstract:
Reconfigurable intelligent surfaces (RIS) and non-orthogonal multiple access (NOMA) are promising techniques to develop next-generation wireless systems. While RIS has huge potential to create massive device connectivity, NOMA exhibits its spectrum efficient communication among multiple access approaches. RIS is a passive device made up of low-cost meta-surfaces which can control the propagation of radio waves, and it is easily deployable in lots of applications in the Internet of Things. The full-duplex nature of RIS has also been a major reason for its consideration of major emerging and trending technologies. In this paper, we aim to investigate the secrecy performance of the RIS-NOMA-assisted Internet of Things (IoT) systems in the presence of two legitimate users who belong to a cluster, and those devices are associated with the existence of an eavesdropper situated close to such a cluster. This paper considers the devices in the presence of RIS and an eavesdropper. As main performance metrics, the closed-form expressions for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC) are derived to evaluate the performance of legitimate users. Simulations are performed in support of the Monte-Carlo method, and the obtained results show that in most of the cases, the number of meta-surfaces in RIS and signal-to-noise ratio (SNR) levels at the source also plays a pivotal role in influencing the secure performance of the system.
APA, Harvard, Vancouver, ISO, and other styles
11

Rajnish Kumar and Prof (Dr) Aruna Anchal. "Parental Influence in Shaping of Emotional Stability." International Journal for Research Publication and Seminar 16, no. 1 (2025): 93–98. https://doi.org/10.36676/jrps.v16.i1.36.

Full text
Abstract:
One of the most important components of psychological health is emotional stability, which influences a person’s capacity to handle stress, control emotions, and uphold wholesome relationships. By their emotional support, attachment styles, and parenting practices, parents have a big impact on how emotionally stable their kids are. Children's emotional stability, resilience, and psychological health are significantly influenced by parental involvement. The ability to control emotions and handle stress is known as emotional stability, and it is primarily fostered by parental attachment, parenting philosophies, and the family environment. Warmth, support, and consistent punishment are hallmarks of positive parenting, which helps kids develop self-esteem and emotional control. Parenting that is too strict or careless, on the other hand, can exacerbate behavioral problems, anxiety, and emotional instability. Early secure attachment, supported by emotionally available and attentive parents, may provide the groundwork for long-term emotional well-being, according to research. This article suggests the impact of parental influence on emotional stability, examining various psychological theories and past studies.
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Xian. "Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel." IEEE Wireless Communications Letters 2, no. 1 (2013): 50–53. http://dx.doi.org/10.1109/wcl.2012.101812.120660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Awan, Muhammad Faheem, Xiao Fang, Mehrab Ramzan, et al. "Evaluating Secrecy Capacity for In-Body Wireless Channels." Entropy 21, no. 9 (2019): 858. http://dx.doi.org/10.3390/e21090858.

Full text
Abstract:
The next generation of implanted medical devices is expected to be wireless, bringing along new security threats. Thus, it is critical to secure the communication between legitimate nodes inside the body from a possible eavesdropper. This work assesses the feasibility of securing next generation multi-nodal leadless cardiac pacemakers using physical layer security methods. The secure communication rate without leakage of information to an eavesdropper, referred to as secrecy capacity, depends on the signal-to-noise ratios (SNRs) of the eavesdropper and legitimate channels and will be used as a performance metric. Numerical electromagnetic simulations are utilized to compute the wireless channel models for the respective links. These channel models can be approximated with a log-normal distribution which can be used to evaluate the probability of positive secrecy capacity and the outage probability of this secrecy capacity. The channels are modeled for three different frequency bands and a comparison between their secrecy capacities is provided with respect to the eavesdropper distance. It has been found that the positive secrecy capacity is achievable within the personal space of the human body for all the frequency bands, with the medical implant communication systems (MICS) band outperforming others.
APA, Harvard, Vancouver, ISO, and other styles
14

Weill, Pierre-Olivier. "LIQUIDITY PROVISION IN CAPACITY-CONSTRAINED MARKETS." Macroeconomic Dynamics 15, S1 (2011): 119–44. http://dx.doi.org/10.1017/s1365100510000714.

Full text
Abstract:
We study a competitive dynamic financial market subject to a transient selling pressure when market makers face a capacity constraint on their number of trades per unit of time with outside investors. We show that profit-maximizing market makers provide liquidity in order to manage their trading capacity constraint optimally over time: they use slack trading capacity early to accumulate assets when the selling pressure is strong in order to relax their trading capacity constraint and sell to buyers more quickly when the selling pressure subsides. When the trading capacity constraint binds, the bid–ask spread is strictly positive, widening and narrowing as market makers build up and unwind their inventories. Because the equilibrium asset allocation is constrained Pareto-optimal, the time variations in bid–ask spread are not a symptom of inefficient liquidity provision.
APA, Harvard, Vancouver, ISO, and other styles
15

Stojanovski, Toni Draganov, and Ninoslav Marina. "Secure Wireless Communications via Cooperative Transmitting." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/760175.

Full text
Abstract:
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, homogeneous Poisson process and independent uniformly distributed points, are used for the spatial distributions of transmitters and eavesdroppers. We analyse the impact of the number of cooperating transmitters and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying.
APA, Harvard, Vancouver, ISO, and other styles
16

That, Phung Ton, Duy-Hung Ha, and Hong-Nhu Nguyen. "Secrecy capacity analysis of bi-static backscatter communication systems." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3353–60. http://dx.doi.org/10.11591/eei.v11i6.3981.

Full text
Abstract:
The rapid adoption of battery-free internet-of-things (IoT) sensors in multiple environments ranging from agriculture to wildlife surveillance, has seen increased research interest in backscatter communication (BSC) technology. BSC is viewed as a potential technology to enable the further spread of sustainable battery-free IoT applications in environments and scenarios where bulkier-sized battery-powered IoT devices would be unsuitable. In this study, we investigate the secrecy capacity of a bi-static BSC network in the presence of a malicious eavesdropper. The proposed BSC system consists of a reader, multiple backscatter devices, and an eavesdropper. We derive closed-form strictly positive secrecy capacity (SPSC) expressions and ergodic secrecy capacity (ESC) expressions for the BSC reader. Monte Carlo simulations verify the exact capacity expressions.
APA, Harvard, Vancouver, ISO, and other styles
17

Phung, Ton That, Ha Duy-Hung, and Nguyen Hong-Nhu. "Secrecy capacity analysis of bi-static backscatter communication systems." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3353~3360. https://doi.org/10.11591/eei.v11i6.3981.

Full text
Abstract:
The rapid adoption of battery-free internet-of-things (IoT) sensors in multiple environments ranging from agriculture to wildlife surveillance, has seen increased research interest in backscatter communication (BSC) technology. BSC is viewed as a potential technology to enable the further spread of sustainable battery-free IoT applications in environments and scenarios where bulkier-sized battery-powered IoT devices would be unsuitable. In this study, we investigate the secrecy capacity of a bi-static BSC network in the presence of a malicious eavesdropper. The proposed BSC system consists of a reader, multiple backscatter devices, and an eavesdropper. We derive closed-form strictly positive secrecy capacity (SPSC) expressions and ergodic secrecy capacity (ESC) expressions for the BSC reader. Monte Carlo simulations verify the exact capacity expressions.
APA, Harvard, Vancouver, ISO, and other styles
18

Ganapathy, Vieeralingaam, Ramanathan Ramachandran, and Tomoaki Ohtsuki. "Resource Allocation for Secure MIMO-SWIPT Systems in the Presence of Multi-Antenna Eavesdropper in Vehicular Networks." Sensors 23, no. 19 (2023): 8069. http://dx.doi.org/10.3390/s23198069.

Full text
Abstract:
In this paper, we optimize the secrecy capacity of the legitimate user under resource allocation and security constraints for a multi-antenna environment for the simultaneous transmission of wireless information and power in a dynamic downlink scenario. We study the relationship between secrecy capacity and harvested energy in a power-splitting configuration for a nonlinear energy-harvesting model under co-located conditions. The capacity maximization problem is formulated for the vehicle-to-vehicle communication scenario. The formulated problem is non-convex NP-hard, so we reformulate it into a convex form using a divide-and-conquer approach. We obtain the optimal transmit power matrix and power-splitting ratio values that guarantee positive values of the secrecy capacity. We analyze different vehicle-to-vehicle communication settings to validate the differentiation of the proposed algorithm in maintaining both reliability and security. We also substantiate the effectiveness of the proposed approach by analyzing the trade-offs between secrecy capacity and harvested energy.
APA, Harvard, Vancouver, ISO, and other styles
19

Kovačević, Mladen, Carol Wang, and Vincent Y. F. Tan. "Fundamental Limits of Communication Over State-Dependent Channels With Feedback." IEEE Transactions on Communications 67, no. 5 (2019): 3182–91. https://doi.org/10.1109/TCOMM.2019.2894158.

Full text
Abstract:
The fundamental limits of communication over state-dependent discrete memoryless channels with noiseless feedback are studied, under the assumption that the communicating parties are allowed to use variable-length coding schemes. Various cases are analyzed, with the employed coding schemes having either bounded or unbounded codeword lengths, and with state information revealed to the encoder and/or decoder in a strictly causal, causal, or non-causal manner. In each of these settings, necessary and sufficient conditions for positivity of the zero-error capacity are obtained, and it is shown that, whenever the zero-error capacity is positive, it equals the conventional vanishing-error capacity. Moreover, it is shown that the vanishing-error capacity of state-dependent channels is not increased by the use of feedback and variable-length coding. Both these kinds of capacities of state-dependent channels with feedback are thus fully characterized.
APA, Harvard, Vancouver, ISO, and other styles
20

Ahn, Young Chull, Jae Ik Cho, Si Eun Kim, Ah Hee Jeong, and Gil Tae Kim. "Development and Evaluation of Nano Electret Filters for Household Water Treatment." Applied Mechanics and Materials 493 (January 2014): 767–72. http://dx.doi.org/10.4028/www.scientific.net/amm.493.767.

Full text
Abstract:
Korea is expected to one of countries with water shortages, and thus must secure high-quality water resources and strictly maintain them. However, water is frequently polluted and there is still a lack of water treatment technologies and facilities to provide safe water. To remove pollutants, membrane-based methods are being widely used for water treatment. It needs high pressure and energy to capture the pollutants by pore size. In this study, electrostatic force is used to increase the efficiency of filtration and decrease pressure loss. By electro spinning, nanoelectret filter is made with 100 nm in diameter and positive charge potential. Surface potential is measured by electrostatic voltmeter system with nanoelectret filter by three conditions of applied voltage. For the filtration performance, filtration efficiency is measured by filter test system with 0.5 and 1.0 PSL. Also pressure loss of nanoelectret filter is measured by comparing PC membrane.
APA, Harvard, Vancouver, ISO, and other styles
21

Pujiarti, Nunik, Hardani Widhiastuti, and Mulya Virgonita I. Winta. "Description of Emotion Regulation and Attachment Patterns of Cadets at Boarding Maritime Colleges." Dinamika Bahari 5, no. 1 (2024): 18–25. http://dx.doi.org/10.46484/db.v5i1.439.

Full text
Abstract:
Boarding universities require students to follow the existing rules quite strictly, starting from waking up in the morning until going back to sleep. Students who live in dormitories must immediately adjust even though it feels difficult. The demands of the new environment must be responded to wisely. Individuals who have a tough personality will be able to adapt to the demands of a new environment wisely. This research aims to look more closely at the emotional regulation of students who live in dormitories in terms of the attachment patterns they develop before becoming students and during their time as students. This research uses descriptive qualitative research methods, trying to explore the description of students' emotional regulation during life in the dormitory and the impacts that arise. The results of this research reveal that there are four types of attachment patterns with different self-regulation, namely secure, bound, inbound and anxious attachment patterns. The conclusion from the results of this research is that a secure attachment pattern will give rise to positive emotional regulation. Positive emotional regulation needs to be developed so that students are able to undergo education while in the dormitory with excellent mental health, are able to adapt to their social environment well, are more productive and in the future these individuals will be able to face challenges in their lives better. This research continues research expressed by Fitri (2023), namely that the stressors most often experienced by students living in dormitories are intrapersonal stressors at 62.59%. Without mature intrapersonal abilities, it will be difficult for individuals to face the unexpected and establish good relationships with other people
APA, Harvard, Vancouver, ISO, and other styles
22

Adamson, Fiona B. "Crossing Borders: International Migration and National Security." International Security 31, no. 1 (2006): 165–99. http://dx.doi.org/10.1162/isec.2006.31.1.165.

Full text
Abstract:
International migration has moved to the top of the international security agenda, due in part to concerns that migration flows provide conduits for the spread of international terrorism. Although such concerns are not entirely unfounded, they must be placed within the broader context of the range of impacts—both positive and negative—that international migration flows have on states' core national security interests. Migration flows affect at least three dimensions of national security: state capacity and autonomy, the balance of power, and the nature of violent conflict. Overall, migration management presents a far greater security challenge to weak and failing states than to advanced postindustrial states. States that are able to formulate and implement migration policies that harness the power of international migration will be more secure, rather than less secure, in the new globalized security environment.
APA, Harvard, Vancouver, ISO, and other styles
23

Ibrahim, Abdulgani A., Serdar Özgür Ata, and Lütfiye Durak-Ata. "On the Performance of Energy Harvesting Dual-Hop Free-Space Optical Communication Systems with Secrecy Analysis." Sensors 25, no. 2 (2025): 319. https://doi.org/10.3390/s25020319.

Full text
Abstract:
In this study, we present a dual-hop decode-and-forward relaying-based free-space optical (FSO) communication system. We consider utilizing simultaneous lightwave information and power transfer (SLIPT) with a time-splitting technique at the relay, where the direct current component of the received optical signal is harvested as a transmit power for the relay. It is assumed that the FSO links experience a Malaga turbulence channel with pointing errors. In order to evaluate the performance of the proposed communication system, closed-form expressions for outage probability, ergodic capacity, average bit error rate, and throughput are derived. Additionally, to analyze the physical layer security of the proposed system, closed-form expressions for secrecy outage probability and strictly positive secrecy capacity are obtained. Finally, the accuracy of the derived analytical expressions are validated with Monte Carlo simulations. Results show that our proposed system model outperforms its non-SLIPT counterpart.
APA, Harvard, Vancouver, ISO, and other styles
24

Verbeke, Willem, Frank Belschack, Richard P. Bagozzi, Rumen Pozharliev, and Tsachi Ein-Dor. "Why Some People Just “Can’t Get No Satisfaction”: Secure versus Insecure Attachment Styles Affect One’s “Style of Being in the Social World”." International Journal of Marketing Studies 9, no. 2 (2017): 36. http://dx.doi.org/10.5539/ijms.v9n2p36.

Full text
Abstract:
We first seek to explore the relationship between attachment styles of professional financial service customers and their ability to experience customer satisfaction and build relationships with a commercial bank. Secure attached people identify with the commercial bank, feel satisfied and are loyal with the commercial bank. Second, we question whether attachment styles and degrees of satisfaction are also reflected in a capacity to feel pleasure in attachments to luxury products, feel happiness and pro-activeness, develop positive relationships with others, and sleep well for multiple samples of non-commercial customers. Apparently, secure attached people form enjoyable attachments with luxury goods/brands. Equally, in life in general they show a proactive attitude and generosity toward others, and feel low envy. Anxious attachment style relates negatively with appraisal of and relationship formation with commercial banks, negatively with enjoyment and attachment to luxury goods, and negatively with generosity towards people and happiness. In addition, anxious attachment style relates positively with envy towards people and low sleep quality. Avoidant attachment style does not relate with any of the above variables except for a negative association with happiness with life in general. Finally, none of the attachment styles scales relates with the BIS-BAS scale, except that anxious attachment relates with the BIS scale, indicating largely that the attachment system does not function as an approach-avoidance system but helps in homeostatic regulation of stress due to the experience of quiescence with others. By studying how attachment styles affect people in commercial and general social domains we hope to pave the way for further exploration of the fundamental mechanisms that drive secure attached people as opposed to insecure attached people to generally experience positive emotions and outcomes in life. We tentatively suggest that compared to insecure attached people, secure attached people possess a different “style of being in the social world.”
APA, Harvard, Vancouver, ISO, and other styles
25

Grekos, Georges, Labib Haddad, Charles Helou, and Jukka Pihko. "On the General Erdős-Turán Conjecture." International Journal of Combinatorics 2014 (November 17, 2014): 1–11. http://dx.doi.org/10.1155/2014/826141.

Full text
Abstract:
The general Erdős-Turán conjecture states that if A is an infinite, strictly increasing sequence of natural numbers whose general term satisfies an≤cn2, for some constant c>0 and for all n, then the number of representations functions of A is unbounded. Here, we introduce the function ψ(n), giving the minimum of the maximal number of representations of a finite sequence A={ak:1≤k≤n} of n natural numbers satisfying ak≤k2 for all k. We show that ψ(n) is an increasing function of n and that the general Erdős-Turán conjecture is equivalent to limn→∞ψ(n)=∞. We also compute some values of ψ(n). We further introduce and study the notion of capacity, which is related to the ψ function by the fact that limn→∞ψ(n) is the capacity of the set of squares of positive integers, but which is also of intrinsic interest.
APA, Harvard, Vancouver, ISO, and other styles
26

Moris, Martine, Bruno Dombrecht, Chuanwu Xi, Jos Vanderleyden, and Jan Michiels. "Regulatory Role of Rhizobium etli CNPAF512 fnrN during Symbiosis." Applied and Environmental Microbiology 70, no. 3 (2004): 1287–96. http://dx.doi.org/10.1128/aem.70.3.1287-1296.2004.

Full text
Abstract:
ABSTRACT The Rhizobium etli CNPAF512 fnrN gene was identified in the fixABCX rpoN 2 region. The corresponding protein contains the hallmark residues characteristic of proteins belonging to the class IB group of Fnr-related proteins. The expression of R. etli fnrN is highly induced under free-living microaerobic conditions and during symbiosis. This microaerobic and symbiotic induction of fnrN is not controlled by the sigma factor RpoN and the symbiotic regulator nifA or fixLJ, but it is due to positive autoregulation. Inoculation of Phaseolus vulgaris with an R. etli fnrN mutant strain resulted in a severe reduction in the bacteroid nitrogen fixation capacity compared to the wild-type capacity, confirming the importance of FnrN during symbiosis. The expression of the R. etli fixN, fixG, and arcA genes is strictly controlled by fnrN under free-living microaerobic conditions and in bacteroids during symbiosis with the host. However, there is an additional level of regulation of fixN and fixG under symbiotic conditions. A phylogenetic analysis of the available rhizobial FnrN and FixK proteins grouped the proteins in three different clusters.
APA, Harvard, Vancouver, ISO, and other styles
27

Nikolić, Zorica, and Marko Smilić. "E-COMMERCE PHYSICAL LAYER SECURITY: PERFORMANCE ANALYSIS OF EAVESDROPPER ATTACK IN WIRELESS NETWORKS." MB University International Review 1, no. 1 (2023): 74–80. http://dx.doi.org/10.61837/mbuir010123074n.

Full text
Abstract:
The evolution of technology and the internet led to the opening of infinite ways to engage with consumers worldwide. The idea of everything taking place online is now applicable for the finance and banking sector as well. The system of online wallets and e-transactions have become very common as a mode of payment. But handling money on a network is also dangerous as hackers may break into the firewall. The security wireless communication in e-commerce has received extensive attention recently. This paper offers an analytical framework to investigate the eavesdropping attacks over wireless communication link. Eavesdropping attack, as one of typical security threats in wireless communication systems, has attracted considerable attention. We will observe the physical layer security of an arbitrarily dimensioned wireless network in the presence of an unauthorized attacker. In this paper, we will explain different models of eavesdropping and attacks. Also, we will consider basic performance of the system such are secrecy outage probability (SOP), strictly positive secrecy capacity (SPSC) and average secrecy capacity (ASC) based on a probability density function (PDF) and specific cumulative distribution function (CDF).
APA, Harvard, Vancouver, ISO, and other styles
28

Sultan, Khalid, and Dr Mirza Jan. "Information & Communication Explosion of Knowledge Economy with Special reference to Cultural Imperialism." International Journal of Learning and Development 2, no. 5 (2012): 163. http://dx.doi.org/10.5296/ijld.v2i5.2316.

Full text
Abstract:
Abstract This paper focuses on the information and communication which codify the knowledge capacity. It also discusses the explosion of knowledge economy and its intensity. This paper describes the overall structure of economics. Explosion is creating the salient characteristics of the human information landscape. Information and knowledge add value to basic products manufacturing and services are becoming increasingly integrated into complex chains of creation, production and distribution. This paper reflects the omnipotent of cultural imperialism. Sample of randomly selected students was relatively young and well educated of Gomal University. Sampling techniques was strictly confined to a small sample of cross-sectional survey. It implies an acceleration of the rate of growth of stocks of accessible knowledge, with positive implications for economic growth. WWW “Google” “Yahoo”, “MSN” and “AltaVista” found correlated.
APA, Harvard, Vancouver, ISO, and other styles
29

Han, Liu, Dhakir Abbas Ali, and Amiya Bhaumik. "THE EFFECTS OF ELEMENTARY SCHOOL TEACHERS' SKILLS IN MANAGING THE CLASSROOM ON DISCIPLINE-VIOLATING STUDENTS." International Journal of Advances in Business and Management Research 02, no. 01 (2024): 26–31. http://dx.doi.org/10.62674/ijabmr.2024.v2i01.004.

Full text
Abstract:
Teachers who do not strictly enforce classroom rules are likely to blame for the majority of disturbances that occur in schools. This research seeks to investigate the association between effective classroom management strategies and the disciplinary measures taken by primary school children. The study polled over six hundred and twenty-two Antalya educators. The statistical significance of the regression coefficient was determined using an analysis. Teachers' administrative abilities were significantly associated with the extent to which their students followed school policy. The results showed a positive correlation between teachers' first, second, third, fourth, and sixth classroom management dimensions and students' total disciplinary behavior, while the fifth dimension showed an adverse correlation. According to research, there is a strong correlation between certain teacher qualities pertaining to classroom management and students' capacity to behave disciplined in class.
APA, Harvard, Vancouver, ISO, and other styles
30

Neducin, Dejana, Milena Krkljes, and Nadja Kurtovic-Folic. "Hospital outdoor spaces: Therapeutic benefits and design considerations." Facta universitatis - series: Architecture and Civil Engineering 8, no. 3 (2010): 293–305. http://dx.doi.org/10.2298/fuace1003293n.

Full text
Abstract:
The awareness of positive influences of outdoor environment on patients' healing process has long been present in hospital architecture. Despite the fact that economic factors had the greatest impact on hospital design during the past century, which caused a neglect of possible restorative benefits of hospital surroundings, recently developed and integrated healthcare systems are more focused on patients' needs regarding the effects of treatments and services on their satisfaction. With the aim to reduce costs of medical therapies without sacrificing their quality, this new approach resulted in a substantial shift in planning and designing of both indoor and outdoor hospital spaces. This paper presents an analysis of various aspects that need to be taken into account while planning of hospital outdoor spaces. It proposes a list of design considerations that may contribute to achieving a healing environment with positive effects on patients' well-being and outcomes of their medical treatments, while simultaneously raising the overall hospital's efficiency. Having in mind specific organizational structure and functional flows that an institution of this type comprises, these considerations are determined, preconditioned and set up to meet strictly defined norms, regulations and criteria. The purpose of this research is to examine which elements and features and to what extent may assist in generating a supportive, inviting, secure and non-threatening atmosphere of the outdoor hospital surroundings that discharges negative reminiscences, experiences or assumptions on how unpleasant the stay in a hospital may be.
APA, Harvard, Vancouver, ISO, and other styles
31

Dickinson, Helen, Catherine Smith, Nicole Carey, and Gemma Carey. "“We’re Still Struggling a Bit to Actually Figure Out What That Means for Government”: An Exploration of the Policy Capacity Required to Oversee Robot Technologies in Australia and New Zealand Care Services." International Journal of Environmental Research and Public Health 19, no. 8 (2022): 4696. http://dx.doi.org/10.3390/ijerph19084696.

Full text
Abstract:
Many countries are experiencing a “care crisis” driven by increasing demand for care services alongside difficulties in recruiting and retaining an appropriate care workforce. One of the solutions offered to this is the use of robotic technologies. While there are several positives produced by robots, they are not without challenges and have the potential to be misused. History shows disruptive technologies require appropriate policy capacity for these to be effectively stewarded so that we can secure the positive gains of these without encountering potential harms. In this paper, we explore the types of policy capacity needed to oversee robotic technologies. Drawing on interviews with 35 key stakeholders involved with the implementation of robots in Australian and New Zealand care services, we identify the capabilities required at the individual, organisational, and systemic levels across the analytical, operational, and political domains. We found the respondents perceived a lack of policy capacity to oversee robotics in the government. However, these gaps are less in respect to technological skills and abilities and more in respect to the system’s impacts and effects of these technologies. We conclude by outlining a summary of the capabilities required to oversee robots in complex care systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Dimitrijevic, Aleksandar, Natasa Hanak, and Sonja Milojevic. "Psychological characteristics of future helping professionals: Empathy and attachment of psychology students." Psihologija 44, no. 2 (2011): 97–115. http://dx.doi.org/10.2298/psi1102097d.

Full text
Abstract:
In this study we investigated whether psychology students differ than students who have chosen non-helping professions in psychological features important for helping activities: attachment and empathy. The sample consisted of psychology students from Belgrade and Novi Sad (N=452) and students from several Belgrade University faculties for non-helping professions. The revised version of Attachment Questionnaire was used for assessment of attachment, while empathy was assessed by Empathy Quotient. The results confirmed hypotheses about the greater prevalence of secure attachment pattern, higher empathic capacity, better mentalizing, and more positive model of the other among the future helpers. These differences between student groups are present at the enrolment, with gender controlled. Finally, the prevalence of the secure attachment pattern and high empathy scores rises with the years spent at studying psychology. We concluded that psychology studies are chosen by persons with higher motivation and capacities for helping professions. Although women outnumber men, differences between the future helping professionals and others cannot be explained by the gender structure of the sample, since men in the helping professions have better results than women in the nonhelping ones.
APA, Harvard, Vancouver, ISO, and other styles
33

An, Yohan, and Namkyu Park. "Economic Analysis for Investment of Public Sector’s Automated Container Terminal: Korean Case Study." Journal of Marine Science and Engineering 9, no. 5 (2021): 459. http://dx.doi.org/10.3390/jmse9050459.

Full text
Abstract:
The purpose of this case study is to conduct an economic analysis to calculate the proper terminal capacity of automated container terminal (ACT) investment from the perspective of the public sector. As a key element of smart port, the ACT is an important terminal operating facility for import/export and transshipment cargo between countries and must have facilities with sufficient capacity to load/unload export/import cargo in a timely manner according to the user’s request. Recently, the method of calculating the capacity of seaport infrastructure is changing from the method of applying the maximum capacity to the method of applying the proper capacity. Therefore, it is desirable to expand port facilities by investigating proper capacity rather than expanding port facilities based on the maximum performance. This study is a case study focusing on the new port of Busan introducing the ACT. From the perspective of national fiscal income and national economy from the ACT investment, this study determines the proper terminal capacity for each berth. As a result of economic analysis, the break-even terminal capacity to secure economic feasibility is from 544,272TEU of the nine berths to 600,138TEU of two berths applying a 2.96% discount ratio. In a sensitivity analysis considering the social discount rate and the change in the size of berths, the net present value has a positive value from a minimum of 530,000 TEU (nine berths with 1.96% social discount ratio) to a maximum of 620,000 TEU (three berths with 3.46% social discount ratio).
APA, Harvard, Vancouver, ISO, and other styles
34

Mapingulila, Hilary, Hezron Onyancha, and Fortunatus Mbua. "Contribution of Biometric Fingerprint in Reducing Prevalence of Unauthorized Absenteeism among Employees in Public Organizations in Moshi Municipality." Business Management and Strategy 15, no. 2 (2024): 219. http://dx.doi.org/10.5296/bms.v15i2.22257.

Full text
Abstract:
This study investigated the contribution of biometric fingerprint technology in reducing unauthorized absences among employees in public organizations within Moshi Municipality, Tanzania. Grounded in the Social Control Theory, the research utilized a convergent parallel mixed-methods approach. The target population consisted of 3,218 public employees from 45 organizations, with a sample of 356 respondents. The study collected qualitative and quantitative data, ensuring validity and reliability through content, face validity, and Cronbach's alpha. Quantitative data was analyzed using descriptive statistics in SPSS, while qualitative data underwent context analysis. Ethical guidelines were strictly adhered to. The findings revealed that public servants in Moshi Municipality perceived biometric fingerprint technology as a reliable solution for addressing unauthorized absences in the workplace. Implementation of this biometric has created a secure and accountable work environment. The study concludes that the use of biometric fingerprint technology has positive contributions to attendance management, accountability, and productivity of public organization employees. Further, it was recommended that public organizations prioritize clear communication with employees about the purpose, benefits, and safeguards of biometric fingerprint technology. Additionally, further research is suggested to explore the challenges faced by employees in utilizing this technology, with the aim of contributing to the existing knowledge base on biometric fingerprints in public organizations.
APA, Harvard, Vancouver, ISO, and other styles
35

Quamruzzaman, A. K. M., M. Rabiul Islam, L. Akter, et al. "Good Agricultural Practice (GAP) Trials in Brinjal: A Step Toward Safer, Nutritious, and Secure Food Systems in Bangladesh." Discoveries in Agriculture and Food Sciences 13, no. 03 (2025): 64–79. https://doi.org/10.14738/tnc.1303.18839.

Full text
Abstract:
To validate the Good Agricultural Practices (GAP) standards, a trial of brinjal (variety: Caity) from Ispahani Seed Company was conducted at a farmer's field in Shibpur, Narsingdi, Bangladesh, during the summer season of 2024. The objective was to produce high-quality and safe brinjal following GAP guidelines. The Government of Bangladesh officially authorized the Bangladesh GAP protocol in 2023, providing a framework for producers to cultivate high-quality crops for consumers. All activities in this trial adhered to the Bangladesh GAP protocol to ensure superior brinjal production. A total of 37 decimals of land, owned by Md. Belayet Hossain was planted with brinjal on March 13, 2024. The crop was managed strictly according to GAP standards. Harvesting took place over a period from May 8, 2024, to July 26, 2024, with a total of 22 harvests. The first harvest was conducted on May 8, 2024, while the final (22nd) harvest occurred 168 days after transplanting, on July 26, 2024. The entire yield was obtained from the 37-decimal plot, with fruit yield per harvest varying depending on the harvest time. The yield ranged from 69.69 kg to 206.19 kg per plot. A similar trend was observed in the fruit yield per hectare, which ranged from 465.23 kg/ha to 1,376.46 kg/ha. These values represent single-harvest yields. The total fruit yield from the 37-decimal plot was 3,045 kg, while the estimated yield per hectare was 20,331 kg. These findings indicate that brinjal production under GAP standards can ensure high-quality yields, contributing to both local and export markets. The economic analysis of brinjal production reveals a positive return on investment, as indicated by the Benefit-Cost Ratio (BCR) of 1.31.
APA, Harvard, Vancouver, ISO, and other styles
36

Ji, Fangkun, Guilin Xi, Yaowen Xie, et al. "Estimating Grassland Carrying Capacity in the Source Area of Nujiang River and Selinco Lake, Tibetan Plateau (2001–2020) Based on Multisource Remote Sensing." Remote Sensing 16, no. 20 (2024): 3790. http://dx.doi.org/10.3390/rs16203790.

Full text
Abstract:
Estimating the spatiotemporal variations in natural grassland carrying capacity is crucial for maintaining the balance between grasslands and livestock. However, accurately assessing this capacity presents significant challenges due to the high costs of biomass measurement and the impact of human activities. In this study, we propose a novel method to estimate grassland carrying capacity based on potential net primary productivity (NPP), applied to the source area of the Nujiang River and Selinco Lake on the Tibetan Plateau. Initially, we utilize multisource remote sensing data—including soil, topography, and climate information—and employ the random forest regression algorithm to model potential NPP in areas where grazing is banned. The construction of the random forest model involves rigorous feature selection and hyperparameter optimization, enhancing the model’s accuracy. Next, we apply this trained model to areas with grazing, ensuring a more accurate estimation of grassland carrying capacity. Finally, we analyze the spatiotemporal variations in grassland carrying capacity. The main results showed that the model achieved a high level of precision, with a root mean square error (RMSE) of 4.89, indicating reliable predictions of grassland carrying capacity. From 2001 to 2020, the average carrying capacity was estimated at 9.44 SU/km2, demonstrating a spatial distribution that decreases from southeast to northwest. A slight overall increase in carrying capacity was observed, with 65.7% of the area exhibiting an increasing trend, suggesting that climate change has a modest positive effect on the recovery of grassland carrying capacity. Most of the grassland carrying capacity is found in areas below 5000 m in altitude, with alpine meadows and alpine meadow steppes below 4750 m being particularly suitable for grazing. Given that the overall grassland carrying capacity remains low, it is crucial to strictly control local grazing intensity to mitigate the adverse impacts of human activities. This study provides a solid scientific foundation for developing targeted grassland management and protection policies.
APA, Harvard, Vancouver, ISO, and other styles
37

Zeng, Ka. "Legal Capacity and Developing Country Performance in the Panel Stage of the WTO Dispute Settlement System." Journal of World Trade 47, Issue 1 (2013): 187–213. http://dx.doi.org/10.54648/trad2013006.

Full text
Abstract:
Existing literature has yielded some evidence suggesting that developing countries are less likely to file World Trade Organization (WTO) trade disputes or to secure concessions in the consultation stage instead of the panel stage of the dispute settlement process. Furthermore, this 'bias' in the use of the dispute settlement mechanism against developing countries has often been attributed to developing countries' lack of legal capacity, or the financial, human and institutional resources available to analyse, pursue or litigate a dispute. However, much of this literature focuses on the constraining effect of legal capacity in the pre-panel ruling stage of the process. This article extends previous research and uses various alternative measures of legal capacity to more systematically analyse the effect of legal capacity on developing countries' performance during the panel stage of the dispute settlement process. Empirical analysis of WTO disputes filed by developing countries that have ended with a panel ruling between 1980 and 2010 shows that developing countries with greater government efficiency and regulatory quality are more likely to obtain positive panel rulings, although there is little evidence suggesting that legal capacity as measured by the size of a country's delegation in Geneva or its past experience in initiating WTO disputes may enhance its prospect of successfully defending its legal claims in the panel stage of the dispute settlement process. This result reinforces prior findings about the disadvantages developing countries face in the dispute settlement system and underscores the need for developing countries to engage in domestic capacity building in order to enhance their chances of successfully litigating at the WTO.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Xianyu, Daoxing Guo, Kongzhe Yang, and Silin Xie. "Secure downlink transmission with finite resolution analog beamforming in massive multiple-input multiple-output system." International Journal of Distributed Sensor Networks 14, no. 9 (2018): 155014771880225. http://dx.doi.org/10.1177/1550147718802254.

Full text
Abstract:
To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system. This article investigates the secure downlink massive multiple-input multiple-output data transmission with artificial noise at base station in the presence of a multi-antenna passive eavesdropper. The achievable user’s ergodic information rate and ergodic capacity of the eavesdropper are analyzed in detail, respectively. With maximum ratio transmission or maximum ratio combining, we derive closed-form expressions for a tight lower bound on ergodic secrecy rate and tight upper bound for secrecy outage probability. Based on these analytical expressions, the effects of various system parameters on secrecy performance, such as power allocation factor, number of eavesdropper’s antennas, number of the user terminals, total transmission power, and finite resolution analog beamforming parameters, are investigated in detail. Also, the optimal power allocation scheme between data and artificial noise signals is achieved in closed form to maximize the ergodic secrecy rate. In addition, we derive the conditions that the secure massive multiple-input multiple-output system need to meet to obtain a positive secrecy rate. Finally, numerical simulation results validate the system’s secrecy performance and verify all the theoretical analytical results.
APA, Harvard, Vancouver, ISO, and other styles
39

Waqar, M. U., S. Murray, A. O’Reilly, H. G. Kennedy, and M. Davoren. "Insight into Illness Among Inpatients in a National Forensic Mental Health Service: A Dundrum Forensic Redevelopment Evaluation Study (D-FOREST)." European Psychiatry 67, S1 (2024): S154—S155. http://dx.doi.org/10.1192/j.eurpsy.2024.344.

Full text
Abstract:
IntroductionForensic psychiatric services serve a dual purpose: treatment of mental disorders and prevention of associated violent reoffending. Progression along the secure care pathway is often impeded by impaired insight, mainly as a result of treatment-resistant psychoses.ObjectivesWe assessed levels of insight among patients in Ireland’s National Forensic Mental Health Service before and after its relocation from the historic 1850 campus in Dundrum to a modern facility in Portrane, Dublin.MethodsThe VAGUS insight scale was used in this repeated measures study before and after the relocation at two time points 42 months apart. All inpatients were invited to participate in completing the self-report (VAGUS-SR) and clinician-rated (VAGUS-CR) versions on both occasions. Total scores of both versions were averaged to obtain a combined VAGUS insight score. Corresponding Positive and Negative Syndrome Scale (PANSS) scores were used to ascertain correlations between the insight and symptomatology scales. This study is part of the Dundrum Forensic Redevelopment Evaluation Study (D-FOREST)Results40 pairs of observations were available for legal capacity to consent to medication, combined VAGUS-CR and VAGUS-SR assessments of insight (Cronbach’s alpha=0.927), and PANSS. VAGUS-CR insight and PANSS scores were progressively better from admission and high dependency wards through medium-term medium secure wards to rehabilitation and pre-discharge wards. Mean scores did not change significantly over this time interval. Those legally certified fit to give or withhold consent by their treating consultant psychiatrists scored significantly better on the VAGUS combined insight scale: 8.3 (SD 1.7) v 5.3 (2.2) at baseline, paired t=25.9, p<0.001; and also 42 months later: 8.2 (1.4) v 5.7 (3.9), paired t=5.2, p=0.022. PANSS subscales were all significantly better for those assessed as being capacitous. Change in combined VAGUS score correlated with change in all PANSS subscales. Binary logistic regression with legal capacity as the dependent variable yielded a model in which combined VAGUS score and PANSS positive symptom score were independent determinants of assessed capacity status. Receiver operating characteristic area under the curve was 0.873, 95% CI 0.760-0.986, at baseline and 0.856, 95% CI 0.720-0.991, at 42 months. A score of 7.3 yielded a sensitivity of 0.8 and a specificity of 0.8.ConclusionsThe combined VAGUS score is a reliable and valid measure of insight relevant to functional mental capacity to consent to treatment with sensitivity and specificity sufficient to guide but not bind clinical decision-making. It measures a quality that varies with symptom severity but is also partly independent of symptom severity; the constructive inclusion of self-reported insight is notable.Disclosure of InterestNone Declared
APA, Harvard, Vancouver, ISO, and other styles
40

Zeng, Yanyang, Yang Hua, Yiwei Fang, and Xiaohong Wang. "Physical Layer Security for CRNs over Beaulieu-Xie Fading Channels." Wireless Communications and Mobile Computing 2022 (August 8, 2022): 1–9. http://dx.doi.org/10.1155/2022/6785754.

Full text
Abstract:
In recent years, the access of massive communication devices leads to the insufficient spectrum resources of wireless networks. One of the practical means to resolve the problem is to build cognitive radio networks (CRNs), which can realize the sharing of spectrum resources between primary and secondary users, thereby improving the utilization rate of wireless spectrum resources. To this end, the CRNs are utilized to establish the Wyner’s eavesdropping model over the Beaulieu-Xie fading channels. We mainly deduce the accurate expressions of secrecy outage probability and strictly positive secrecy capacity to explore the performance of physical layer security. Moreover, the better overlap between the statistical simulation and the theoretical results indicates the correctness of the theoretical analysis equation. The interesting results are that both increasing the P max and decreasing the C t h can improve the security performance. This work is a good reference and guidance for modeling CRNs (Internet of Things, fifth generation, cell phone networks, etc.) and security performance evaluation.
APA, Harvard, Vancouver, ISO, and other styles
41

Bechet, D. M., and B. N. Perry. "A novel class of inactive steroid-binding sites in female rat liver nuclei." Journal of Endocrinology 110, no. 1 (1986): 27–36. http://dx.doi.org/10.1677/joe.0.1100027.

Full text
Abstract:
ABSTRACT Nuclear salt extracts from intact female rat liver showed insignificant levels of progesterone-, oestradiol-, testosterone- or dexamethasone-specific binding. However, brief exposure of nuclear extracts to dextran-coated charcoal (DCC) induced binding for all the above classes of steroids. This 'DCC-effect', which was reproduced neither by gel filtration nor by extensive dialysis of the nuclear extract, could not be ascribed to removal of endogenous free or loosely bound steroids. We show that rat liver nuclei contain a class of secondary binding sites (BsII), which exhibit moderate or low affinity for steroid ligands, positive co-operativity, and cross-reaction between classes of steroids. The capacity of BsII sites to bind steroids depends strictly on prior neutralization by DCC of endogenous heat-stable non-dialysable inhibitor(s). The putative roles of these BsII binding sites are discussed in relation to component(s) probably responsible for inhibitory activity. J. Endocr. (1986) 110, 27–36
APA, Harvard, Vancouver, ISO, and other styles
42

Shahi, Sara, Daniela Tuninetti, and Natasha Devroye. "The Strongly Asynchronous Massive Access Channel." Entropy 25, no. 1 (2022): 65. http://dx.doi.org/10.3390/e25010065.

Full text
Abstract:
This paper considers the Strongly Asynchronous, Slotted, Discrete Memoryless, Massive Access Channel (SAS-DM-MAC) in which the number of users, the number of messages, and the asynchronous window length grow exponentially with the coding blocklength with their respective exponents. A joint probability of error is enforced, ensuring that all the users’ identities and messages are correctly identified and decoded. Achievability bounds are derived for the case that different users have similar channels, the case that users’ channels can be chosen from a set which has polynomially many elements in the blocklength, and the case with no restriction on the users’ channels. A general converse bound on the capacity region and a converse bound on the maximum growth rate of the number of users are derived. It is shown that reliable transmission with an exponential number of users with an exponential asynchronous exponent with joint error probability is possible at strictly positive rates.
APA, Harvard, Vancouver, ISO, and other styles
43

Sophiya, Bartalwar* T. Deepa. "DESIGN AND IMPLEMENTATION OF OFDM SIGNAL TRANSMISSION FOR VISIBLE LIGHT COMMUNICATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 577–83. https://doi.org/10.5281/zenodo.322489.

Full text
Abstract:
Optical wireless communication (OWC) in the infrared and visible range is quite attractive solution, especially where radio communication face challenges. Visible light communication (VLC) a data communications medium uses visible light (VL) over a range of 400 and 800 THz (780–375 nm) and is a subset of OWC technologies. With an increasing demand for use of wireless communications, wireless access via Wi-Fi is facing many challenges especially in terms of capacity, availability, efficiency and security. Li-Fi uses intensity modulation and direct detection. Therefore, the signals must be strictly real valued and positive. These constraints pose limitation on digital modulation techniques. These limitations result in spectrum-efficiency or power-efficiency losses. In this paper, we investigate an amplitude shift keying (ASK) based orthogonal frequency division multiplexing (OFDM) signal transmission scheme for VLC technology. The ASK technique also works efficiently for transmission of digital data over optical fiber. In this paper, M ary ASK is proposed for use in OFDM systems.
APA, Harvard, Vancouver, ISO, and other styles
44

Dinh-Thuan, Do, Van Nguyen Minh-Sang, and Hoang Thi-Anh. "Comparison study on secrecy probability of AF-NOMA and AF-OMA networks." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 5 (2019): 2200–2207. https://doi.org/10.12928/TELKOMNIKA.v17i5.11111.

Full text
Abstract:
The strictly positive secrecy capacity (SPSC) performance is examined in a new design of non-orthogonal multiple access (NOMA) considered in this study. This system model employs Amplify-and-Forward (AF) relaying scheme to serve far users. In this scheme, a transmitter sends confidential signal to far users. It can be raised falling performance in the presence of an external eavesdropper in such NOMA system. With regard to orthogonal multiple access (OMA), performance of NOMA system model is compared. In particular, tradeoff the SPSC performance and transmit SNR is examined. In this study, the SPSC is evaluated as the secrecy metric to limit impacts of the practical passive eavesdropper in real scenario. It is confirmed that the secrecy performance of NOMA is significantly lower than OMA due to related parameters characterization in NOMA, and it should be controlled by varying related coefficients. As main results, both of NOMA and OMA against to impact of eavesdropper is studied in terms of analytically result and numerically result.
APA, Harvard, Vancouver, ISO, and other styles
45

Severi, Claudia, Cosimo Rota, and Cesare Zanasi. "The Resilience Approach Contribution to Rural Communities Social Assessment for Social Sustainability Based Strategies Implementation." International Journal on Food System Dynamics 3, no. 1 (2012): 61–73. https://doi.org/10.18461/ijfsd.v3i1.316.

Full text
Abstract:
Evaluating the rural communities capacity to manage changes is of paramount importance for effective Social Sustainability strategies identification. The aim of the present study is to analyze if social resilience can be integrated into the social assessment of rural communities, with the aim of implementing sustainability-oriented policies and strategies.A literature review was carried out on the Resilience approach definition and its application to the Social Assessment in rural areas. The analysis showed that the Resilience approach enriches the Social Assessment by focusing on the specific capabilities of the communities in managing changes. The Resilience perspective embraces the dynamic character of communities and human-ecosystem interactions providing a deeper understanding of how a community’s positive response to change can be strengthened and supported. Moreover, the specific focus on rural communities highlights how strongly social and ecological resilience are intertwined in guaranteeing social sustainability which, in turn, is strictly interrelated with environmental and economic sustainability.
APA, Harvard, Vancouver, ISO, and other styles
46

Yang, Zhen, Qingwei Sun, Yunliang Qi, Shouliang Li, and Fengyuan Ren. "A Hyper-Chaotically Encrypted Robust Digital Image Watermarking Method with Large Capacity Using Compress Sensing on a Hybrid Domain." Entropy 24, no. 10 (2022): 1486. http://dx.doi.org/10.3390/e24101486.

Full text
Abstract:
The digital watermarking technique is a quite promising technique for both image copyright protection and secure transmission. However, many existing techniques are not as one might have expected for robustness and capacity simultaneously. In this paper, we propose a robust semi-blind image watermarking scheme with a high capacity. Firstly, we perform a discrete wavelet transformation (DWT) transformation on the carrier image. Then, the watermark images are compressed via a compressive sampling technique for saving storage space. Thirdly, a Combination of One and Two-Dimensional Chaotic Map based on the Tent and Logistic map (TL-COTDCM) is used to scramble the compressed watermark image with high security and dramatically reduce the false positive problem (FPP). Finally, a singular value decomposition (SVD) component is used to embed into the decomposed carrier image to finish the embedding process. With this scheme, eight 256×256 grayscale watermark images are perfectly embedded into a 512×512 carrier image, the capacity of which is eight times over that of the existing watermark techniques on average. The scheme has been tested through several common attacks on high strength, and the experiment results show the superiority of our method via the two most used evaluation indicators, normalized correlation coefficient (NCC) values and the peak signal-to-noise ratio (PSNR). Our method outperforms the state-of-the-art in the aspects of robustness, security, and capacity of digital watermarking, which exhibits great potential in multimedia application in the immediate future.
APA, Harvard, Vancouver, ISO, and other styles
47

Sundarapandian, Vaidyanathan. "SLIDING CONTROLLER DESIGN FOR THE GLOBAL CHAOS SYNCHRONIZATION OF IDENTICAL HYPERCHAOTIC YUJUN SYSTEMS." International Journal of Advanced Information Technology (IJAIT) 2, no. 4 (2012): 13–22. https://doi.org/10.5281/zenodo.3565528.

Full text
Abstract:
This paper establishes new results for the sliding controller design for the global chaos synchronization of identical hyperchaotic Yujun systems (2010). Hyperchaotic systems are chaotic nonlinear systems having more than one positive Lyapunov exponent. Because of the complex dynamics properties of hyperchaotic system such as high capacity, high security and high efficiency, they are very useful in secure communication devices and data encryption. Using sliding mode control theory and Lyapunov stability theory, a general result has been obtained for the global chaos synchronization of identical chaotic nonlinear systems. As an application of this general result, this paper designs a sliding controller for the global chaos synchronization of hyperchaotic Yujun systems. Numerical results and simulations are shown to validate the proposed sliding controller design and demonstrate its effectiveness in achieving global chaos synchronization of hyperchaotic Yujun systems.
APA, Harvard, Vancouver, ISO, and other styles
48

Jayakrishna, Makka, Praveen Boddana, and M. Vijay. "Assessing The Sustainability of Chemical Control Methods in Pest Management: A Review of Carrying Capacity and Pesticide Use." Journal of Advanced Zoology 44, no. 4 (2023): 129–43. http://dx.doi.org/10.17762/jaz.v44i4.924.

Full text
Abstract:
In the present study, the harmful effect of Partheniumhysterophoruson soil, humans, crops and animals has been studied. Apart from that, it has also been understood from the study that despite the negative effect of the weed it has some positive effects also including antidiabetic, antioxidant, antitumor and antimicrobial activities. The study’s main objective is to look into Parthenium hysterophorus’s damaging effects on farmland. In addition, another objective is to assess the effectiveness of chemical pest management for P. hysterophorus and find the harmful effects or sustainability of P. hysterophorus pesticide use on the environment.The chemical constituents of the weed help to understand the cause and effect of the weed on humans. On the other hand, the chemical control method of P.hysterophorushas been studied along with the concept of carrying capacity. The research questions of the present study are whether the effect of P. hysterophorus on crop production is negative or positive. Additionally, what should be the chemical control methods and what are the effect and level of sustainability of the chemical control method of herbicides have been focused on in the research questions. The null hypothesis of the present research has shown that there is no relation between the level of weed and the amount of crop production. On the other hand, alternative hypotheses have stated that P. hysterophoruscan reduce the amount of crop in the field. This research utilized an experimental approach to investigate the impact of P. hysterophorus on crop yields. All of this study has been carried out by strictly adhering to a replacement experimental design. The study resulted in the negative impact of P. hysterophorus on crop production. It has also been found that glyphosate, 2,4-D, atrazine has played a positive role in the chemical control of the weed. Lastly, the negative impact of those herbicides by affecting non-target organisms, contamination of water resources and health effects has also been found.
APA, Harvard, Vancouver, ISO, and other styles
49

Oriss, Timothy B., Susan A. McCarthy, Martha A. K. Campana, and Penelope A. Morel. "Evidence of Positive Cross-Regulation on Th1 by Th2 and Antigen-Presenting Cells: Effects on Th1 Induced by IL-4 and IL-12." Journal of Immunology 162, no. 4 (1999): 1999–2007. http://dx.doi.org/10.4049/jimmunol.162.4.1999.

Full text
Abstract:
Abstract The response of Th cells to cytokines is normally strictly regulated, such that following antigenic stimulation, Th cells respond for only a short period of time, after which they become refractory to cytokine-mediated effects. IL-12, a costimulator of Th1 having no proliferation-inducing capacity of its own, allows Th1 clones and lines to respond to IL-4 when they would otherwise be unable to respond to this cytokine. Cells that have proliferated in response to IL-4 plus IL-12 are fully able to be subsequently activated by specific Ag and APC. Additionally, the response to IL-4 of Th1 effector cells derived from normal murine spleen is enhanced significantly by IL-12. Furthermore, in the presence of IL-12, stimulated Th2 can induce proliferation of Th1 via IL-4 production, in a dual chamber culture system. We hypothesize that the effects of IL-4 and IL-12 represent a novel, positive cross-regulatory pathway that acts on Th1, and is mediated by Th2 (the IL-4 source) and APC (the IL-12 source). We propose this as a way for a Th2 immune response to positively influence an ongoing or waning Th1 response.
APA, Harvard, Vancouver, ISO, and other styles
50

Seshire, Anita, Tim Beissert, Claudia Oancea, Dieter Hoelzer, Martin Ruthardt, and Elena Puccetti. "Overexpression of APC Reduces Stem Cell Capacity and Leukemogenic Potential of PLZF/RAR-Positive Leukemic Stem Cells." Blood 110, no. 11 (2007): 874. http://dx.doi.org/10.1182/blood.v110.11.874.874.

Full text
Abstract:
Abstract Acute myeloid leukemia (AML)-associated fusion proteins (AAFP), such as PML/RAR, PLZF/RAR or AML1/ETO have leukemogenic potential in vivo which is related to their capacity to induce a differentiation block and aberrant self renewal in early hematopoietic progenitors. The potential of the AAFP to induce the leukemic phenotype is strictly related to their capacity to oligomerize and to form high molecular weight complexes (HMW). Furthermore we recently showed that the deregulation of the Wnt-signaling seems to be a key event for the leukemogenesis by the above mentioned AAFP because it is indispensable for the aberrant self renewal of leukemic stem cells (LSC). A „tandem affinity purification” (TAP) screen of KG1 cells expressing PLZF/RAR, PML/RAR or AML-1/ETO for elucidating the composition of the related HMW revealed the „adenomatous polyposis coli” protein (APC) as an interaction partner of PLZF/RAR. APC is a key inhibitory regulator of the Wnt-signaling and is frequently inactivated by mutations in colon carcinomas. Therefore the role of the interaction between APC and PLZF/RAR for the leukemogenesis was further investigated. Here we report that i.) only PLZF/RAR strongly interacted with APC as confirmed by co-immunoprecipitation experiments; ii.) the overexpression of APC reverted the aberrant activation of the Wnt-signaling by PLZF/RAR as revealed by a reduction of the TCF/LEF mediated transcriptional activity; iii.) the overexpression of APC also reduced the self renewal potential of PLZF/RAR-positive HSC as revealed by a reduced replating efficiency of these cells in semi solid medium, as well as by a reduction of the colony number in colony forming units spleen (CFU-S) assays; iv.) APC was able to revert the leukemogenic potential of PLZF/RAR-positive LSC as revealed by the retroviral overexpression of APC in bone marrow isolated from mice with PLZF/RAR-induced AML which were inoculated into secondary recipients. In fact until now the presence of APC significantly increased the survival of these secondary recipients with respect to mock-infected controls. Taken together these data strongly suggest that the direct interaction with PLZF/RAR is an important mechanism for the functional inactivation of APC which contributes to the aberrant activation of the Wnt-signaling in PLZF/RAR-positive cells. Furthermore our data provide further evidence that the aberrantly activated Wnt-signaling pathway represents a valid target for molecular therapy approaches.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!