Results 51 to 60 of about 2,245 (194)
Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba +4 more
core +1 more source
When is a Function Securely Computable? [PDF]
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication.
Gupta, Piyush +2 more
core +1 more source
Research on Three‐Dimensional Autonomous Obstacle Avoidance Path Planning Methods for UAVs
This study presents a three‐dimensional autonomous obstacle‐avoidance path planning method for unmanned aerial vehicles (UAVs) based on a deep reinforcement learning (DRL)‐enhanced Mayfly Algorithm. The traditional Mayfly Algorithm suffers from issues such as random initial population generation and slow convergence.
Chong Wu, Hao Cheng, Hua Wang
wiley +1 more source
Noncausal AR‐ARCH Model and Its Applications to Financial Time Series
ABSTRACT We extend the noncausal autoregressive models by introducing noncausality into the variance component, allowing the volatility to depend on future prices as well. We refer to this model as the noncausal AR‐ARCH model, and it enables us to account for shocks arising from market agents who possess more information and engage in forward‐looking ...
Yaosong Zhan +3 more
wiley +1 more source
Secure D2D underlaying cellular communication based on artificial noise assisted
A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added ...
Xiao-lei KANG +2 more
doaj +2 more sources
Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels
In this paper, we study the impacts of transmit antenna selection on the secrecy performance of massive MIMO systems. We consider a wiretap setting in which a fixed number of transmit antennas are selected and then confidential messages are transmitted ...
Asaad, Saba +4 more
core +1 more source
Endogenous Technology Spillovers in R&D Collaboration Networks
ABSTRACT We introduce an R&D network formation model where firms choose both R&D efforts and collaboration partners. Neighbors in the network benefit from each other's R&D through technology spillovers, and there exists competition effects reflecting strategic substitutability in R&D.
Chih‐Sheng Hsieh +2 more
wiley +1 more source
Almost universal codes for fading wiretap channels
We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information.
Ling, Cong +2 more
core +4 more sources
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Secure Massive MIMO Communication with Low-resolution DACs
In this paper, we investigate secure transmission in a massive multiple-input multiple-output (MIMO) system adopting low-resolution digital-to-analog converters (DACs).
Ng, Derrick Wing Kwan +4 more
core +1 more source

