Results 81 to 90 of about 4,724 (196)

Secrecy and reliability performance of an energy-harvesting-enabled two-user NOMA system

open access: yesETRI Journal
We analyze the secrecy attributes of an energy-harvesting-enabled decode-and-forward relay-based cooperative nonorthogonal multiple access (NOMA)system in the presence of an eavesdropper.
Alok Baranwal   +2 more
doaj   +1 more source

Secrecy performance analysis on cooperative CR-NOMA network

open access: yesTongxin xuebao, 2020
In order to improve the secrecy performance of communication system and make efficient use of limited spectrum,overlay cognitive radio (OCR) technology was combined with non-orthogonal multiple access (NOMA) technology and the communication model was ...
Zhen YANG, Mengyao ZHU, Youhong FENG
doaj  

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

open access: yesEntropy, 2020
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu   +4 more
doaj   +1 more source

A Review of Human–AI Synergy in Smart Energy Management Concepts, Functions, Applications, and Future Frontiers

open access: yesEnergy Internet, Volume 3, Issue 1, Page 5-22, April 2026.
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An   +5 more
wiley   +1 more source

Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages

open access: yesEntropy, 2019
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song   +4 more
doaj   +1 more source

Distribution network planning based on double deep Q‐network with self‐adjusting parameters

open access: yesEnergy Conversion and Economics, Volume 7, Issue 2, Page 105-126, April 2026.
Abstract To address the challenge of low adaptability in distribution network planning caused by significant regional differences in electricity consumption, this paper proposes a distribution network planning method based on a self‐adjusting parameter double deep Q‐network (SAP‐DDQN).
Xingquan Ji   +6 more
wiley   +1 more source

Incentive contract design for supplier reliability: The role of asymmetric information on reliability level and improvement costs

open access: yesDecision Sciences, Volume 57, Issue 2, Page 133-152, April 2026.
Abstract We study a supply chain subject to supply disruptions, where the supplier can exert costly effort to mitigate the impact of disruptions and improve reliability. The supplier's current reliability level and the cost of improving reliability can each be high or low and are privately known only to the supplier.
Yutian Li, Sammi Y. Tang
wiley   +1 more source

Physical Layer Security Using Two-Path Successive Relaying

open access: yesSensors, 2016
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj   +1 more source

Best Before? Expiring Central Bank Digital Currency and Loss Recovery

open access: yesJournal of Money, Credit and Banking, Volume 58, Issue 3, Page 787-819, April 2026.
Abstract Physical cash enables payments in the absence of electricity or network coverage. Such offline payment functionality promotes the operational resilience and, particularly in developing countries, the accessibility of payments. Central banks are exploring issuing digital cash substitutes with similar offline payment functionality.
CHARLES M. KAHN   +2 more
wiley   +1 more source

On Physical Layer Security Over the Fisher-Snedecor ${\mathcal{F}}$ Wiretap Fading Channels

open access: yesIEEE Access, 2018
In this paper, we initially investigate the physical layer security over device-to-device communications, where the channel is modeled from the Fisher-Snedecor .T distribution.
Long Kong, Georges Kaddoum
doaj   +1 more source

Home - About - Disclaimer - Privacy