Results 61 to 70 of about 18,041 (194)

Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels

open access: yes, 2017
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba   +4 more
core   +1 more source

Research on Three‐Dimensional Autonomous Obstacle Avoidance Path Planning Methods for UAVs

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 37, Issue 2, February 2026.
This study presents a three‐dimensional autonomous obstacle‐avoidance path planning method for unmanned aerial vehicles (UAVs) based on a deep reinforcement learning (DRL)‐enhanced Mayfly Algorithm. The traditional Mayfly Algorithm suffers from issues such as random initial population generation and slow convergence.
Chong Wu, Hao Cheng, Hua Wang
wiley   +1 more source

Noncausal AR‐ARCH Model and Its Applications to Financial Time Series

open access: yesInternational Journal of Finance &Economics, Volume 31, Issue 1, Page 1424-1443, January 2026.
ABSTRACT We extend the noncausal autoregressive models by introducing noncausality into the variance component, allowing the volatility to depend on future prices as well. We refer to this model as the noncausal AR‐ARCH model, and it enables us to account for shocks arising from market agents who possess more information and engage in forward‐looking ...
Yaosong Zhan   +3 more
wiley   +1 more source

On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels [PDF]

open access: yes, 2010
A Gaussian multiple-input single-output (MISO) wiretap channel model is considered, where there exists a transmitter equipped with multiple antennas, a legitimate receiver and an eavesdropper each equipped with a single antenna.
Li, Jiangyuan, Petropulu, Athina P.
core  

Vehicle Communication using Secrecy Capacity

open access: yes, 2018
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang   +17 more
core   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Secure two-way communication via a wireless powered untrusted relay and friendly jammer

open access: yes, 2017
In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ).
Kuhestani, Ali   +3 more
core   +1 more source

Encrypt Anything: A Content‐Aware Hierarchical Privacy Protection Method for Image Data

open access: yesIET Computer Vision, Volume 20, Issue 1, January/December 2026.
This paper proposes the Encrypt Anything Model (EAM), a content‐aware hierarchical privacy protection method that integrates the Segment Anything Model (SAM) and Grounding‐DINO to automatically detect and segment privacy entities in images. EAM dynamically adjusts the encryption granularity according to the sensitivity level of privacy and introduces a
Jiawei Han   +5 more
wiley   +1 more source

New look at secure performance of massive MIMO with low-resolution DACs

open access: yesICT Express, 2023
Since the requirement of secure transmission for massive multiple-input–multiple-output (mIMO) is high, we consider a secure massive MIMO system in presence of multiple digital to analog converters (DACs). We deal with complicated performance analysis of
Anh-Tu Le   +4 more
doaj   +1 more source

A Parameter Identification Method of Train Basic Resistance Based on Improved White Shark Algorithm

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
In this research, an identification framework based on train single‐mass dynamics model is first established to transform the parameter identification problem into a parameter optimization problem. Subsequently, an improved White Shark Algorithm incorporating Logistic Chaos Map, Time‐Varying Inertia Weight, and Gaussian Random Walk is designed to solve
Anzheng Lai   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy