Results 51 to 60 of about 11,528 (153)
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming +4 more
core +1 more source
Abstract Artificial intelligence and automation are no longer just buzzwords in the biopharmaceutical industry. The manufacturing of a class of biologics, comprising monoclonal antibodies, cell therapies, and gene therapies, is far more complex than that of traditional small molecule drugs.
Shyam Panjwani, Hao Wei, John Mason
wiley +1 more source
Detection of active eavesdropper in large scale planar arrays
Physical layer security(PLS) is efficient in providing security for wireless communications and in relaxing the complexity of the required cryptographic technologies. A PLS method, i.e. detection of active eavesdropper, using large scale planar arrays is
Su Xiaofeng, Chen Haihua
doaj +1 more source
Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission
In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system.
Ali, Zain +3 more
core +1 more source
ABSTRACT Global challenges such as climate change, resource scarcity and ecological degradation demand that companies rethink how they create, deliver and capture value. Sustainable business model innovations (SBMIs) offer a promising pathway, yet empirical insights into how different SBMI archetypes affect consumer adoption behavior are scarce.
Lennard Stutz +3 more
wiley +1 more source
Physical-Layer Security Improvement in MIMO OFDM Systems Using Multilevel Chaotic Encryption
Ensuring physical-layer security (PLS) in wireless communication has always been a challenge due to the broadcasting nature of the transmission. In this work, a multilevel chaotic encryption (MCE) system is proposed to improve PLS in Multiple-Input ...
Mohammad Mahmudul Hasan +2 more
doaj +1 more source
Secure two-way communication via a wireless powered untrusted relay and friendly jammer
In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ).
Kuhestani, Ali +3 more
core +1 more source
Machine Learning Approaches for GC–MS Data Interpretation in Flavour and Fragrance Analysis
The review explores machine learning integration in GC‐MS data analysis for the fragrance and flavour industry, highlighting recent advances and techniques in a context constrained by data scarcity and intellectual property concerns. ABSTRACT This review explores the integration of machine learning (ML) in the analysis of mass spectrometry data ...
Jean‐Baptiste Coffin +3 more
wiley +1 more source
Vehicle Communication using Secrecy Capacity
We address secure vehicle communication using secrecy capacity. In particular, we research the relationship between secrecy capacity and various types of parameters that determine secrecy capacity in the vehicular wireless network.
Aiqing Zhang +17 more
core +1 more source
This study verified that it is feasible to distinguish oranges of different origins, grades and shelf lives by using hyperspectral technology. It covers spectral, image and graph technologies, as well as machine learning and deep learning models. ABSTRACT This study reports the first application of hyperspectral feature fusion technology combined with ...
Honghui Xiao +9 more
wiley +1 more source

