Results 61 to 70 of about 2,320 (256)

Secrecy and reliability performance of an energy-harvesting-enabled two-user NOMA system

open access: yesETRI Journal
We analyze the secrecy attributes of an energy-harvesting-enabled decode-and-forward relay-based cooperative nonorthogonal multiple access (NOMA)system in the presence of an eavesdropper.
Alok Baranwal   +2 more
doaj   +1 more source

Does ESG Matter for Unlisted Companies in the Agri‐Food Industry? Evidence From Japan's Unlisted Agri‐Food Companies

open access: yesAgribusiness, EarlyView.
ABSTRACT While ESG (environmental, social, and governance) is emphasized among listed companies for their stakeholders and ESG disclosures, ESG engagement among unlisted companies has been rarely examined due to data limitations. This is particularly problematic for the agri‐food industry that has significant impacts on the environment and consists ...
Ying Wang, Satoru Shimokawa
wiley   +1 more source

Secrecy Performance Analysis of IRS-assisted NLoS Wireless Systems Over Nakagami-m Fading Channel

open access: yesJournal of Communications Software and Systems
Due to increasing security threats in next generation wireless networks and promising potential of intelligent reflecting surface (IRS) in enhancing the wireless system’s performance, this paper focuses on secure transmission of passive and active IRS ...
Ravneet Kaur, Bajrang Bansal
doaj   +1 more source

Alternative Policy Designs to Help Farmers Select Profitable Conservation Practices

open access: yesAgribusiness, EarlyView.
ABSTRACT Voluntary private carbon initiatives (VPCIs) promote the implementation of agricultural conservation practices that mitigate emissions of greenhouse gases (GHGs) via financial incentives to participating farmers. Simultaneously, an array of public policies supports the adoption of conservation practices through technical and financial ...
Oranuch Wongpiyabovorn   +1 more
wiley   +1 more source

On construction of perfect ciphers

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2014
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj   +1 more source

What to Make and How to Make It: Combining Machine Learning and Statistical Learning to Design New Materials

open access: yesAdvanced Intelligent Discovery, EarlyView.
Combining machine learning and probabilistic statistical learning is a powerful way to discover and design new materials. A variety of machine learning approaches can be used to identify promising candidates for target applications, and causal inference can help identify potential ways to make them a reality.
Jonathan Y. C. Ting, Amanda S. Barnard
wiley   +1 more source

Artificial Intelligence for Bone: Theory, Methods, and Applications

open access: yesAdvanced Intelligent Discovery, EarlyView.
Advances in artificial intelligence (AI) offer the potential to improve bone research. The current review explores the contributions of AI to pathological study, biomarker discovery, drug design, and clinical diagnosis and prognosis of bone diseases. We envision that AI‐driven methodologies will enable identifying novel targets for drugs discovery. The
Dongfeng Yuan   +3 more
wiley   +1 more source

Towards Foundations of Cryptography: Investigation of Perfect Secrecy

open access: yes, 1996
JUCS - Journal of Universal Computer Science Volume Nr.
Jürgensen,H., Robbins,L.
openaire   +3 more sources

Self-tallying Elections and Perfect Ballot Secrecy [PDF]

open access: yes, 2002
Strong voter privacy, although an important property of an election scheme, is usually compromised in election protocol design in favor of other (desirable) properties. In this work we introduce a new election paradigm with strong voter privacy as its primary objective.
Aggelos Kiayias, Moti Yung
openaire   +1 more source

Machine Learning‐Enhanced Random Matrix Theory Design for Human Immunodeficiency Virus Vaccine Development

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study integrates random matrix theory (RMT) and principal component analysis (PCA) to improve the identification of correlated regions in HIV protein sequences for vaccine design. PCA validation enhances the reliability of RMT‐derived correlations, particularly in small‐sample, high‐dimensional datasets, enabling more accurate detection of ...
Mariyam Siddiqah   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy