Results 61 to 70 of about 2,320 (256)
Secrecy and reliability performance of an energy-harvesting-enabled two-user NOMA system
We analyze the secrecy attributes of an energy-harvesting-enabled decode-and-forward relay-based cooperative nonorthogonal multiple access (NOMA)system in the presence of an eavesdropper.
Alok Baranwal +2 more
doaj +1 more source
ABSTRACT While ESG (environmental, social, and governance) is emphasized among listed companies for their stakeholders and ESG disclosures, ESG engagement among unlisted companies has been rarely examined due to data limitations. This is particularly problematic for the agri‐food industry that has significant impacts on the environment and consists ...
Ying Wang, Satoru Shimokawa
wiley +1 more source
Secrecy Performance Analysis of IRS-assisted NLoS Wireless Systems Over Nakagami-m Fading Channel
Due to increasing security threats in next generation wireless networks and promising potential of intelligent reflecting surface (IRS) in enhancing the wireless system’s performance, this paper focuses on secure transmission of passive and active IRS ...
Ravneet Kaur, Bajrang Bansal
doaj +1 more source
Alternative Policy Designs to Help Farmers Select Profitable Conservation Practices
ABSTRACT Voluntary private carbon initiatives (VPCIs) promote the implementation of agricultural conservation practices that mitigate emissions of greenhouse gases (GHGs) via financial incentives to participating farmers. Simultaneously, an array of public policies supports the adoption of conservation practices through technical and financial ...
Oranuch Wongpiyabovorn +1 more
wiley +1 more source
On construction of perfect ciphers
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj +1 more source
Combining machine learning and probabilistic statistical learning is a powerful way to discover and design new materials. A variety of machine learning approaches can be used to identify promising candidates for target applications, and causal inference can help identify potential ways to make them a reality.
Jonathan Y. C. Ting, Amanda S. Barnard
wiley +1 more source
Artificial Intelligence for Bone: Theory, Methods, and Applications
Advances in artificial intelligence (AI) offer the potential to improve bone research. The current review explores the contributions of AI to pathological study, biomarker discovery, drug design, and clinical diagnosis and prognosis of bone diseases. We envision that AI‐driven methodologies will enable identifying novel targets for drugs discovery. The
Dongfeng Yuan +3 more
wiley +1 more source
Towards Foundations of Cryptography: Investigation of Perfect Secrecy
JUCS - Journal of Universal Computer Science Volume Nr.
Jürgensen,H., Robbins,L.
openaire +3 more sources
Self-tallying Elections and Perfect Ballot Secrecy [PDF]
Strong voter privacy, although an important property of an election scheme, is usually compromised in election protocol design in favor of other (desirable) properties. In this work we introduce a new election paradigm with strong voter privacy as its primary objective.
Aggelos Kiayias, Moti Yung
openaire +1 more source
This study integrates random matrix theory (RMT) and principal component analysis (PCA) to improve the identification of correlated regions in HIV protein sequences for vaccine design. PCA validation enhances the reliability of RMT‐derived correlations, particularly in small‐sample, high‐dimensional datasets, enabling more accurate detection of ...
Mariyam Siddiqah +3 more
wiley +1 more source

