Results 41 to 50 of about 11,712 (147)
Physical Layer Security for 6G: Toward Achieving Intelligent Native Security at Layer-1
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G communication operation mode. 6G mobile network will enable intelligent applications, automated services, and low-latency connectivity to data networks. Security performance
Israt Ara, Brian Kelley
doaj +1 more source
Performance enhancement solutions in wireless communication networks [PDF]
In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses ...
Huynh Tan, Phuoc
core
Artificial Noise Injection for Securing Single-Antenna Systems
We propose a novel artificial noise (AN) injection scheme for wireless systems over quasi-static fading channels, in which a single-antenna transmitter sends confidential messages to a half-duplex receiver in the presence of an eavesdropper.
He, Biao +2 more
core +2 more sources
A novel approach for in situ benthic habitat characterization
Abstract Habitat heterogeneity is a key driver of temporal and spatial variability of subtidal marine benthic biodiversity. However, this makes it a challenging environment in which to measure and quantify the factors driving biodiversity in a consistent manner.
Ryan J. W. Mathews +4 more
wiley +1 more source
Secure Compute-and-Forward Transmission With Artificial Noise and Full-Duplex Devices
We consider a wiretap channel with an eavesdropper (Eve) and an honest but curious relay (Ray). Ray and the destination (Bob) are full-duplex (FD) devices.
Tomasin, Stefano
core +1 more source
ABSTRACT This study presents an analysis of the literature on artificial intelligence (AI), blockchain and internet of things (IoT) for the sustainable development of the service industry of freight transport and logistics service providers (LSPs).
Roberto Cerchione +2 more
wiley +1 more source
Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A. +3 more
core +1 more source
ABSTRACT The tourism sector faces pressing sustainability challenges, especially during crises. The rural communities reliant on ecotourism remain vulnerable, highlighting the need for responsible tourism. This study integrates social cognitive theory (SCT) and the elaboration likelihood model (ELM) to examine how self‐efficacy and outcome expectation ...
Wei Chiang Chan +2 more
wiley +1 more source
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks
Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications ...
Han, Z. +4 more
core +1 more source
Pentatricopeptide repeat proteins coordinate nucleus‐organelle communication by modulating RNA metabolism within chloroplasts and mitochondria. This review highlights how they control critical processes like photosynthesis, seed development, fertility restoration, and stress survival in crops, and explores their potential as programmable tools for RNA ...
Mingming Wu +7 more
wiley +1 more source

