A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 176

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016

File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Amplitude Constrained Vector Gaussian Wiretap Channel: Properties of the Secrecy-Capacity-Achieving Input Distribution. | LitMetric

This paper studies the secrecy capacity of an -dimensional Gaussian wiretap channel under a peak power constraint. This work determines the largest peak power constraint R¯n, such that an input distribution uniformly distributed on a single sphere is optimal; this regime is termed the low-amplitude regime. The asymptotic value of R¯n as goes to infinity is completely characterized as a function of noise variance at both receivers. Moreover, the secrecy capacity is also characterized in a form amenable to computation. Several numerical examples are provided, such as the example of the secrecy-capacity-achieving distribution beyond the low-amplitude regime. Furthermore, for the scalar case (n=1), we show that the secrecy-capacity-achieving input distribution is discrete with finitely many points at most at the order of R2σ12, where σ12 is the variance of the Gaussian noise over the legitimate channel.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10217458PMC
http://dx.doi.org/10.3390/e25050741DOI Listing

Publication Analysis

Top Keywords

input distribution
12
gaussian wiretap
8
wiretap channel
8
secrecy-capacity-achieving input
8
secrecy capacity
8
peak power
8
power constraint
8
low-amplitude regime
8
amplitude constrained
4
constrained vector
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!