Results 71 to 80 of about 18,041 (194)
Q‐Learning Power Allocation in FSO‐NOMA Networks Against Intelligent Jamming Attacks
This paper proposes a reinforcement learning‐based power allocation framework for NOMA‐enabled free‐space optical (FSO) communication systems under intelligent jamming attacks. By employing a Q‐learning algorithm, the transmitter adaptively adjusts power distribution to maximise system throughput and resilience.
Mohammad Ali Amirabadi
wiley +1 more source
Almost universal codes for fading wiretap channels
We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information.
Ling, Cong +2 more
core +4 more sources
Optimizing Heart Risk Attack Diagnosis by Hybridizing XGBoost and Chaotic Binary Bat Algorithm
Accurate feature selection remains a critical challenge in heart disease prediction due to high‐dimensional data and complex feature interactions. This study proposes a hybrid framework that integrates extreme gradient boosting with a chaotic binary bat algorithm to improve feature‐selection efficiency and predictive performance.
Syaiful Anam +4 more
wiley +1 more source
Secrecy Capacity Region of Fading Broadcast Channels
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin +2 more
core +2 more sources
Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano +5 more
wiley +1 more source
A dynamical system is studied such that belongs to a class of Buslaev nets. This class contains traffic models with complex network structure. We provide results for a more general system than the system that was in consideration earlier. A new version of model has been provided.
Marina Yashina +3 more
wiley +1 more source
Artificial-Noise-Aided Secure Multi-Antenna Transmission with Limited Feedback
We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver.
Heath Jr, Robert W. +3 more
core +1 more source
Given the explosive increase in mobile data traffic, the wireless communication system of today and beyond has to be able to offer both high spectral efficiency and energy efficiency (EE) under challenging propagation environments such as deep indoor, high‐speed mobility, or tunneling. This work presents an improved structure of doing SIMO SC‐FDMA–DMWT
Mohammed Aboud Kadhim +3 more
wiley +1 more source
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A. +3 more
core +1 more source
A dynamic model of a multisupported sliding bearing rotor system (exhaust camshaft) incorporating journal roundness error is established based on the Lagrange equation. The Timoshenko beam element is employed to simulate the flexibility of the shaft segment, while the cam unit is simplified using an eccentric mass block and modeled through the ...
Xun Zhang +5 more
wiley +1 more source

