Results 71 to 80 of about 4,724 (196)
Rapid 5G/6G evolution demands cross‐layer resource management to address congestion, latency, and reliability in multi‐hop wireless networks. This paper proposes a TOHRP–LBCA framework using DSA and congestion−/topology−/interference‐aware routing and channel allocation, yielding throughput gains, lower latency, improved packet delivery, and higher ...
Emmanuel Ahatsi, Oludolapo Olanrewaju
wiley +1 more source
Physical Layer Security of WPCNs With Imperfect CSI and Full-Duplex Receiver Aided Jamming
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested energy to send the artificial jamming for ...
Mu Li +4 more
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
The rapid proliferation of independently-designed and -deployed wireless sensor networks extremely crowds the wireless spectrum and promotes the emergence of cognitive radio sensor networks (CRSN).
Dawei Wang +4 more
doaj +1 more source
Advancing Systemic Risk Assessment for Complex, Interdependent Systems: A Research Agenda
ABSTRACT Engineering risk assessment has traditionally focused on direct impacts to individual assets or systems. However, as society's most notable risks increasingly stem from complex, interdependent systems, conventional methods fail to capture the cascading consequences and deepening uncertainty. Addressing this gap requires developing or extending
Tom Logan +9 more
wiley +1 more source
On the Secrecy Performance of Land Mobile Satellite Communication Systems
In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas ...
Kang An +3 more
doaj +1 more source
This article provides a comprehensive review of loss mechanisms in the generation stage of energy systems, covering fossil, nuclear, and renewable technologies. It examines their environmental and operational implications and shows how overlooking generation losses distorts efficiency assessments.
Pooya Parvizi +4 more
wiley +1 more source
Zero-Outage Secrecy in Short Packet IoT-Aided Cellular Cooperative Network With EH-NOMA
The zero-outage secrecy with energy harvesting is considered in short packet IoT-aided cellular cooperative networks using the inspired non-orthogonal multiple access (NOMA) strategy.
Hien Quang Ta +3 more
doaj +1 more source
Secure Communication in Millimeter Wave Relaying Networks
The use of relay can expand the coverage of millimeter-wave (mmWave) signals, whereas it may increase the risk of information leakage due to the additional link from source to relay.
Ruiqian Ma +4 more
doaj +1 more source
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source

