Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba +4 more
core +1 more source
Research on Three‐Dimensional Autonomous Obstacle Avoidance Path Planning Methods for UAVs
This study presents a three‐dimensional autonomous obstacle‐avoidance path planning method for unmanned aerial vehicles (UAVs) based on a deep reinforcement learning (DRL)‐enhanced Mayfly Algorithm. The traditional Mayfly Algorithm suffers from issues such as random initial population generation and slow convergence.
Chong Wu, Hao Cheng, Hua Wang
wiley +1 more source
Noncausal AR‐ARCH Model and Its Applications to Financial Time Series
ABSTRACT We extend the noncausal autoregressive models by introducing noncausality into the variance component, allowing the volatility to depend on future prices as well. We refer to this model as the noncausal AR‐ARCH model, and it enables us to account for shocks arising from market agents who possess more information and engage in forward‐looking ...
Yaosong Zhan +3 more
wiley +1 more source
On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels [PDF]
A Gaussian multiple-input single-output (MISO) wiretap channel model is considered, where there exists a transmitter equipped with multiple antennas, a legitimate receiver and an eavesdropper each equipped with a single antenna.
Li, Jiangyuan, Petropulu, Athina P.
core
Vehicle Communication using Secrecy Capacity
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang +17 more
core +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Secure two-way communication via a wireless powered untrusted relay and friendly jammer
In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ).
Kuhestani, Ali +3 more
core +1 more source
Encrypt Anything: A Content‐Aware Hierarchical Privacy Protection Method for Image Data
This paper proposes the Encrypt Anything Model (EAM), a content‐aware hierarchical privacy protection method that integrates the Segment Anything Model (SAM) and Grounding‐DINO to automatically detect and segment privacy entities in images. EAM dynamically adjusts the encryption granularity according to the sensitivity level of privacy and introduces a
Jiawei Han +5 more
wiley +1 more source
New look at secure performance of massive MIMO with low-resolution DACs
Since the requirement of secure transmission for massive multiple-input–multiple-output (mIMO) is high, we consider a secure massive MIMO system in presence of multiple digital to analog converters (DACs). We deal with complicated performance analysis of
Anh-Tu Le +4 more
doaj +1 more source
A Parameter Identification Method of Train Basic Resistance Based on Improved White Shark Algorithm
In this research, an identification framework based on train single‐mass dynamics model is first established to transform the parameter identification problem into a parameter optimization problem. Subsequently, an improved White Shark Algorithm incorporating Logistic Chaos Map, Time‐Varying Inertia Weight, and Gaussian Random Walk is designed to solve
Anzheng Lai +6 more
wiley +1 more source

