Results 81 to 90 of about 18,041 (194)
In this paper, we present a comprehensive secrecy performance analysis of wireless powered communication networks with multiple eavesdroppers, where an energy-limited information source with multiple antennas harvests the radio frequency energy from a ...
Yuzhen Huang +3 more
doaj +1 more source
Secure Massive MIMO Communication with Low-resolution DACs
In this paper, we investigate secure transmission in a massive multiple-input multiple-output (MIMO) system adopting low-resolution digital-to-analog converters (DACs).
Ng, Derrick Wing Kwan +4 more
core +1 more source
Endogenous Technology Spillovers in R&D Collaboration Networks
ABSTRACT We introduce an R&D network formation model where firms choose both R&D efforts and collaboration partners. Neighbors in the network benefit from each other's R&D through technology spillovers, and there exists competition effects reflecting strategic substitutability in R&D.
Chih‐Sheng Hsieh +2 more
wiley +1 more source
Secure Wireless Information and Power Transfer Based on Tilt Adaptation in 3-D Massive MIMO Systems
In this paper, we investigate a secure transmission algorithm exploiting the vertical domain for simultaneous wireless information and power transfer (SWIPT) in a massive multiple-input multiple-output system over Rician fading channels. Each user adopts
Lixing Fan +3 more
doaj +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Secure Performance Analysis of Satellite-Terrestrial Networks-Assisted Backscatter Device
This study investigates the secrecy performance of a satellite–backscatter device communication system in the presence of a potential eavesdropper.
Hong Nhu Nguyen +4 more
doaj +1 more source
Artificial Noise Aided Precoding With Imperfect CSI in Full-Duplex Relaying Secure Communications
In Rayleigh fading channels, to enhance the secrecy performance of wireless communication systems and efficiently disturb the interception of eavesdroppers, the multiple-antenna source node utilizes the artificial noise aided precoding (ANP) strategy ...
Yuanjian Li +4 more
doaj +1 more source
Productive Misallocation and International Transmission of Credit Shocks
ABSTRACT We study the role of international trade in cross‐country financial shock transmission using an equilibrium business cycle model calibrated to the United States and Canada. Heterogeneous firms have differing needs for external finance and face occasionally binding collateral constraints hindering their investments, while input–output linkages ...
Yuko Imura, Julia K. Thomas
wiley +1 more source
Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming +2 more
core +1 more source
Twenty‐Five Years of Probabilistic Fault Displacement Hazard Assessment
Abstract Fault displacement hazard poses significant risks to critical infrastructure such as buildings, roads, and pipelines. While some structures can tolerate a certain degree of surface displacement, others, such as buildings, are far more vulnerable. Probabilistic Fault Displacement Hazard Assessment (PFDHA) quantifies the probability of exceeding
A. Valentini +4 more
wiley +1 more source

