Results 121 to 130 of about 144,734 (270)

Diversifying Environmental, Social and Governance Portfolios: Evidence From China

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study extends traditional portfolio optimization methods by incorporating Environmental, Social and Governance (ESG) performance measures into diversification strategies, specifically focusing on data from the Chinese stock market. By integrating ESG scores and their constituent components (E, S and G), the study examines portfolio ...
Danyang Li   +3 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

A coding scheme to force the eavesdropper falling in error avalanche

open access: yesElectronics Letters
In recent years, key generation schemes based on the reciprocity of wireless channels have gained widespread attention in the field of wireless physical layer security.
Hang Zhao, Aiqun Hu, Jiabao Yu
doaj   +1 more source

Managing maternity: Moving care, not patients, using artificial intelligence (AI), internet‐of‐things (IOT) and point‐of‐care testing (POCT) devices

open access: yesInternational Journal of Gynecology &Obstetrics, EarlyView.
Abstract The integration of artificial intelligence (AI) into healthcare is accelerating and maternity care is at a pivotal moment for the strategic implementation of these technologies. This article explores how AI‐assisted women's health innovations, often termed “FemTech,” may transform pregnancy care by addressing long‐standing disparities ...
Lin Foo   +17 more
wiley   +1 more source

Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method

open access: yesIET Networks, Accepted Article., 2022
This research uses big data technology to combine the process of product innovation design method, which has certain significance for the formation of intelligent and systematic product innovation design method. Meanwhile, while predicting the results of all products innovative design methods, it can improve the product's predictive innovative design ...
Ren Li, Qiang Zeng
wiley   +1 more source

Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism

open access: yesElectronics Letters
As automobile intelligence continues to develop, the electronic control units connected to the Controller Area Network (CAN) bus within vehicles face an increasing number of threats from potential attacks originating from the internet.
Qiang Dong, Zenglu Song, Haoshu Shao
doaj   +1 more source

Review of millimeter‐wave and terahertz near‐field synthetic aperture radar imaging technology

open access: yesInfoScience, EarlyView.
Abstract This paper comprehensively reviews the development of millimeter‐wave (MMW) and terahertz (THz) near‐field imaging technologies, with an emphasis on the state of synthetic aperture radar (SAR)‐based imaging technologies. Near‐field imaging technologies are categorized into passive and active imaging modes, among which active imaging is favored
Qi Yang   +3 more
wiley   +1 more source

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

Specific emitter identification under extremely small sample conditions via chaotic integration

open access: yesElectronics Letters
As a potential solution to improve wireless security, specific emitter identification is a lightweight access authentication technology. However, the existed deep learning‐based specific emitter identification methods are highly dependent on the training
Haotian Zhang   +3 more
doaj   +1 more source

Intelligent materials for on‐demand electromagnetic absorption

open access: yesInfoMat, EarlyView.
This review introduces an innovative “stimulus‐state‐property” paradigm, facilitating a fundamental transition from static to dynamically intelligent electromagnetic wave absorption (EMWA). The key advancement lies in the synergistic integration of external fields with structurally engineered metamaterials and tunable components.
Chongyang Chai   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy