Results 71 to 80 of about 4,651 (205)
The inherent broadcast nature has exposed the land mobile satellite (LMS) communication systems to severe security threats in both the civil and military applications.
Yusheng Li +3 more
doaj +1 more source
Extreme‐weather risk and the cross‐section of stock returns
Abstract We document an extreme‐weather risk premium in the cross‐section of stock returns. Between 1995 and 2019, stocks of domestic U.S. firms with the most negative sensitivity to aggregate storm losses earned an annual excess‐return spread of more than 6 percentage points relative to those with the most positive sensitivity, a difference not ...
Alexander Braun +2 more
wiley +1 more source
Physical Layer Security of WPCNs With Imperfect CSI and Full-Duplex Receiver Aided Jamming
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested energy to send the artificial jamming for ...
Mu Li +4 more
doaj +1 more source
Secrecy Outage Analysis Over Fluctuating Two-Ray Fading Channels
In this letter, we analyze the secrecy outage probability (SOP) over fluctuating two-ray fading channels but with a different definition from the one adopted in [5].
Alouini, Mohamed-Slim +3 more
core +1 more source
Abstract Remaining useful life (RUL) analysis of equipment prevents failures and assists in maintenance to address impending failures. To achieve this, the advancement of degradation can be measured through a determinant variable. This work presents a new methodology for estimating the number of remaining cycles (NRC), or RUL, of equipment in cyclic ...
Leonardo M. de Marco +2 more
wiley +1 more source
The rapid proliferation of independently-designed and -deployed wireless sensor networks extremely crowds the wireless spectrum and promotes the emergence of cognitive radio sensor networks (CRSN).
Dawei Wang +4 more
doaj +1 more source
On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of ...
Andrews, Jeffrey G. +3 more
core +1 more source
Can enhanced street lighting improve public safety at scale?
Abstract Research Summary Street crimes are thought to be influenced by changes in ambient lighting; yet, most studies have focused on small‐scale interventions in limited areas. It remains unclear whether enhanced lighting can improve safety on a larger, jurisdiction‐wide scale.
John M. MacDonald +6 more
wiley +1 more source
On the Secrecy Performance of Land Mobile Satellite Communication Systems
In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas ...
Kang An +3 more
doaj +1 more source
This article proposes an integrated design method for a 12 kV intelligent ring main unit and constructs a fault diagnosis and isolation model. Firstly, building an integrated hardware platform can significantly improve perception speed and fusion potential.
Rongrong Shan, Jieyun Qiu, Dong Han
wiley +1 more source

