Results 71 to 80 of about 2,245 (194)
This paper explicitly reviews the state‐of‐the‐art RIS‐assisted wireless networks, especially open challenges relating to the B5G and 6G networks. This work presents an intensive study of recent research on RIS to provide an in‐depth understanding of the underlying principles surrounding RIS operations, composition, and effect on EM waves.
Chukwuemeka Nwufo +2 more
wiley +1 more source
Abstract Previous research on co‐existing paths has usually revolved around the development of a novel path that finally supersedes an existing path. In contrast, this study introduces an empirically grounded conception of the dynamic interplay between two intentionally co‐existing organisational paths, one path persisting although in decline and one ...
Ronja Zientara, Gordon Müller‐Seitz
wiley +1 more source
Secrecy Capacity Region of Fading Broadcast Channels
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin +2 more
core +2 more sources
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley +1 more source
Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming +2 more
core +1 more source
Changing or stable? The effects of adolescents' social media use on psychosocial functioning
Abstract To better understand the effects of social media use on adolescents' psychosocial functioning, this study examined the temporal stability of social media effects across two separate 3‐week experience sampling methodology (ESM) studies conducted 6 months apart in 2019 and 2020.
J. Loes Pouwels +3 more
wiley +1 more source
In this paper, we present a comprehensive secrecy performance analysis of wireless powered communication networks with multiple eavesdroppers, where an energy-limited information source with multiple antennas harvests the radio frequency energy from a ...
Yuzhen Huang +3 more
doaj +1 more source
Ergodic Secrecy Rate of Antenna-Selection-Aided MIMOME Channels with BPSK/QPSK Modulations
This paper analyzes transmit antenna selection (TAS) under Rayleigh flat fading for BPSK/QPSK modulations in multiple-input multiple-output wiretap channels, also termed as multiple-input multiple-output multiple-eavesdropper (MIMOME) channels. In our protocol, a single antenna is selected to transmit the secret message and selection combing (SC) or ...
Ouyang, Chongjun +5 more
openaire +2 more sources
The Matching Function and Nonlinear Business Cycles
Abstract The Cobb‐Douglas matching function is ubiquitous in labor search and matching models, even though it imposes a constant matching elasticity that is unlikely to hold empirically. To examine the implications of this discrepancy, this paper uses a general constant returns to scale matching function to derive conditions that show how the ...
JOSHUA BERNSTEIN +2 more
wiley +1 more source
Secure Wireless Information and Power Transfer Based on Tilt Adaptation in 3-D Massive MIMO Systems
In this paper, we investigate a secure transmission algorithm exploiting the vertical domain for simultaneous wireless information and power transfer (SWIPT) in a massive multiple-input multiple-output system over Rician fading channels. Each user adopts
Lixing Fan +3 more
doaj +1 more source

