Results 71 to 80 of about 18,041 (194)

Q‐Learning Power Allocation in FSO‐NOMA Networks Against Intelligent Jamming Attacks

open access: yesIET Optoelectronics, Volume 20, Issue 1, January/December 2026.
This paper proposes a reinforcement learning‐based power allocation framework for NOMA‐enabled free‐space optical (FSO) communication systems under intelligent jamming attacks. By employing a Q‐learning algorithm, the transmitter adaptively adjusts power distribution to maximise system throughput and resilience.
Mohammad Ali Amirabadi
wiley   +1 more source

Almost universal codes for fading wiretap channels

open access: yes, 2016
We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information.
Ling, Cong   +2 more
core   +4 more sources

Optimizing Heart Risk Attack Diagnosis by Hybridizing XGBoost and Chaotic Binary Bat Algorithm

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
Accurate feature selection remains a critical challenge in heart disease prediction due to high‐dimensional data and complex feature interactions. This study proposes a hybrid framework that integrates extreme gradient boosting with a chaotic binary bat algorithm to improve feature‐selection efficiency and predictive performance.
Syaiful Anam   +4 more
wiley   +1 more source

Secrecy Capacity Region of Fading Broadcast Channels

open access: yes, 2007
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin   +2 more
core   +2 more sources

Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field

open access: yesComputational and Mathematical Methods, Volume 2026, Issue 1, 2026.
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano   +5 more
wiley   +1 more source

Self‐Organization Conditions and Invariant Measure for Traffic Flow on Topological Bouquet With Nonuniform Petals

open access: yesComputational and Mathematical Methods, Volume 2026, Issue 1, 2026.
A dynamical system is studied such that belongs to a class of Buslaev nets. This class contains traffic models with complex network structure. We provide results for a more general system than the system that was in consideration earlier. A new version of model has been provided.
Marina Yashina   +3 more
wiley   +1 more source

Artificial-Noise-Aided Secure Multi-Antenna Transmission with Limited Feedback

open access: yes, 2015
We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver.
Heath Jr, Robert W.   +3 more
core   +1 more source

Next‐Generation SIMO SC‐FDMA–DMWT Systems With Adaptive EGC: Performance Enhancement in Correlated LTE‐Advanced Channels

open access: yesJournal of Control Science and Engineering, Volume 2026, Issue 1, 2026.
Given the explosive increase in mobile data traffic, the wireless communication system of today and beyond has to be able to offer both high spectral efficiency and energy efficiency (EE) under challenging propagation environments such as deep indoor, high‐speed mobility, or tunneling. This work presents an improved structure of doing SIMO SC‐FDMA–DMWT
Mohammed Aboud Kadhim   +3 more
wiley   +1 more source

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

open access: yes, 2014
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A.   +3 more
core   +1 more source

Influence of Coupling Effect Between Tension Force and Journal Roundness Error on Dynamic Characteristics of Engine Camshaft Rotor Bearing System

open access: yesShock and Vibration, Volume 2026, Issue 1, 2026.
A dynamic model of a multisupported sliding bearing rotor system (exhaust camshaft) incorporating journal roundness error is established based on the Lagrange equation. The Timoshenko beam element is employed to simulate the flexibility of the shaft segment, while the cam unit is simplified using an eccentric mass block and modeled through the ...
Xun Zhang   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy