Results 81 to 90 of about 4,724 (196)
Secrecy and reliability performance of an energy-harvesting-enabled two-user NOMA system
We analyze the secrecy attributes of an energy-harvesting-enabled decode-and-forward relay-based cooperative nonorthogonal multiple access (NOMA)system in the presence of an eavesdropper.
Alok Baranwal +2 more
doaj +1 more source
Secrecy performance analysis on cooperative CR-NOMA network
In order to improve the secrecy performance of communication system and make efficient use of limited spectrum,overlay cognitive radio (OCR) technology was combined with non-orthogonal multiple access (NOMA) technology and the communication model was ...
Zhen YANG, Mengyao ZHU, Youhong FENG
doaj
Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu +4 more
doaj +1 more source
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An +5 more
wiley +1 more source
Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song +4 more
doaj +1 more source
Distribution network planning based on double deep Q‐network with self‐adjusting parameters
Abstract To address the challenge of low adaptability in distribution network planning caused by significant regional differences in electricity consumption, this paper proposes a distribution network planning method based on a self‐adjusting parameter double deep Q‐network (SAP‐DDQN).
Xingquan Ji +6 more
wiley +1 more source
Abstract We study a supply chain subject to supply disruptions, where the supplier can exert costly effort to mitigate the impact of disruptions and improve reliability. The supplier's current reliability level and the cost of improving reliability can each be high or low and are privately known only to the supplier.
Yutian Li, Sammi Y. Tang
wiley +1 more source
Physical Layer Security Using Two-Path Successive Relaying
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj +1 more source
Best Before? Expiring Central Bank Digital Currency and Loss Recovery
Abstract Physical cash enables payments in the absence of electricity or network coverage. Such offline payment functionality promotes the operational resilience and, particularly in developing countries, the accessibility of payments. Central banks are exploring issuing digital cash substitutes with similar offline payment functionality.
CHARLES M. KAHN +2 more
wiley +1 more source
On Physical Layer Security Over the Fisher-Snedecor
In this paper, we initially investigate the physical layer security over device-to-device communications, where the channel is modeled from the Fisher-Snedecor .T distribution.
Long Kong, Georges Kaddoum
doaj +1 more source

