Search Results - "Electronics letters"

Refine Results
  1. 1

    Closed‐form expressions for spatial correlation parameters for performance analysis of fluid antenna systems by Wong, K. K., Tong, K. F., Chen, Y., Zhang, Y.

    Published in Electronics letters (01-05-2022)
    “…The emerging fluid antenna technology enables a high‐density position‐switchable antenna in a small space to obtain enormous performance gains for wireless…”
    Get full text
    Journal Article
  2. 2

    An omega‐k algorithm for multireceiver synthetic aperture sonar by Zhang, Xuebo, Yang, Peixuan, Sun, Haixin

    Published in Electronics letters (01-07-2023)
    “…In this Letter, the authors present a novel imaging algorithm for multireceiver synthetic aperture sonar (SAS). The Loffeld's bistatic formula (LBF) including…”
    Get full text
    Journal Article
  3. 3

    Frequency‐domain multireceiver synthetic aperture sonar imagery with Chebyshev polynomials by Zhang, Xuebo, Yang, Peixuan, Sun, Haixin

    Published in Electronics letters (01-12-2022)
    “…Based on Chebyshev polynomials, the two‐way slant range is first approximated by the fourth‐order polynomial approximation. With the series reversion method,…”
    Get full text
    Journal Article
  4. 4

    PotNet: Pothole detection for autonomous vehicle system using convolutional neural network by Dewangan, Deepak Kumar, Sahu, Satya Prakash

    Published in Electronics letters (01-01-2021)
    “…Advancement in vision‐based techniques has enabled the autonomous vehicle system (AVS) to understand the driving scene in depth. The capability of autonomous…”
    Get full text
    Journal Article
  5. 5

    A greedy non‐hierarchical grey wolf optimizer for real‐world optimization by Akbari, Ebrahim, Rahimnejad, Abolfazl, Gadsden, Stephen Andrew

    Published in Electronics letters (01-06-2021)
    “…Grey wolf optimization (GWO) algorithm is a new emerging algorithm that is based on the social hierarchy of grey wolves as well as their hunting and…”
    Get full text
    Journal Article
  6. 6

    Height‐dependent LoS probability model for A2G channels incorporating airframe shadowing under built‐up scenario by Ali, Farman, Pan, Yinglan, Zhu, Qiuming, Ahmad, Naeem, Mao, Kai, Ullah, Habib

    Published in Electronics letters (01-09-2024)
    “…The line of sight (LoS) probability is a key factor for the channel modeling of air‐to‐ground (A2G) communication. However, the existing LoS probability models…”
    Get full text
    Journal Article
  7. 7

    Serial data transmission at 224 Gbit/s applying directly modulated 850 and 910 nm VCSELs by Ledentsov, N., Chorchos, Ł., Makarov, O. Yu, Shchukin, V. A., Kalosha, V. P., Kropp, J.‐R., Turkiewicz, J. P., Kottke, C., Jungnickel, V., Freund, R., Ledentsov, N. N.

    Published in Electronics letters (01-09-2021)
    “…High‐speed discrete multitone serial data transmission over multi‐mode fibre at gross data rates up to 224 Gbit/s achieved with directly modulated…”
    Get full text
    Journal Article
  8. 8

    Stochastic approach to evaluate the shielding effectiveness of composite materials loaded with randomly oriented helices by Hamidi, Ayoub, Cheldavi, Ahmad, Habibnejad Korayem, Asghar

    Published in Electronics letters (01-11-2024)
    “…This letter proposes a method to calculate the expected value of the shielding effectiveness of a composite material slab, including a planar array of randomly…”
    Get full text
    Journal Article
  9. 9

    Compact circularly polarized metasurface antenna based on characteristic mode analysis by Wang, Qing, Lei, Xiaopeng, Han, Xiaohai, Ge, Zhiwei, Lei, Zhenya

    Published in Electronics letters (01-11-2024)
    “…This article introduces a novel, single‐layer, low‐profile, circularly polarized metasurface antenna. Through characteristic mode analysis, the optimization of…”
    Get full text
    Journal Article
  10. 10

    Implementation of entropically secure encryption: Securing personal health data by Temel, Mehmet Hüseyin, Škorić, Boris, Monroy, Idelfonso Tafur

    Published in Electronics letters (01-11-2024)
    “…Abstract Entropically secure encryption (ESE) offers unconditional security with shorter keys compared to the One‐Time Pad. Here, the first implementation of…”
    Get full text
    Journal Article
  11. 11

    Path planning strategies for logistics robots: Integrating enhanced A‐star algorithm and DWA by Zeng, Xianyang, Zhang, Jiawang, Yin, Wenhui, Yang, Hongli, Yu, Hao, Liang, Yuansheng, Tong, Jinwu

    Published in Electronics letters (01-11-2024)
    “…Abstract Path planning is the key part in the process of transportation conducted by logistics robots, and there often exist some problems with it. The path…”
    Get full text
    Journal Article
  12. 12

    Pilot spoofing attack detection and channel estimation for secure massive MIMO by Liu, Delong, Wang, Wei, Huang, Yang

    Published in Electronics letters (01-11-2024)
    “…Pilot spoofing attack (PSA) is an active eavesdropping attack in massive multiple‐input multiple‐output systems, where the eavesdroppers transmit the same…”
    Get full text
    Journal Article
  13. 13

    Design of miniaturized and highly selective frequency selective rasorber based on compact spiral resonator by Xu, Yixuan, Wu, Weiwei, Shi, Qingzhan, Shi, Tongtong, Wang, Shaozhi

    Published in Electronics letters (01-11-2024)
    “…A miniaturized, high‐selectivity, wideband A‐T‐A frequency selective rasorber (FSR) based on compact spiral resonators (CSR) is proposed here. The lossy layer…”
    Get full text
    Journal Article
  14. 14

    Doubly grounded buck‐boost PV grid‐connected inverter without shoot‐through problem by Yao, Zhilei, Zhang, Ximing, Shan, Changlei

    Published in Electronics letters (01-11-2024)
    “…Transformerless grid‐connected inverters (GCIs) are universally utilized in the PV system. However, they have the shoot‐through issue and common mode leakage…”
    Get full text
    Journal Article
  15. 15

    Low‐temperature SOI SiGe/Si superlattice FinFET with omega‐shaped channel and self‐allied silicide for 3D sequential IC by Qin, Xu‐Lei, Sang, Guan‐Qiao, Cao, Lei, Li, Qing‐Kun, Jiang, Ren‐Jie, Wei, Yan‐Zhao, Li, Jun‐Feng, Yao, Jia‐Xin, Zhang, Mei‐He, Zhang, Qing‐Zhu, Yin, Hua‐Xiang

    Published in Electronics letters (01-11-2024)
    “…In this letter, to improve the performance and reduce leakage currents of bulk low‐temperature multi‐layer SiGe/Si superlattice (SL) fin field‐effect…”
    Get full text
    Journal Article
  16. 16

    Modelling and analysis of repulsive cellular networks using Matérn hard‐core point processes by Chen, Chunlin

    Published in Electronics letters (01-11-2024)
    “…Abstract The repulsive nature of Matérn hard‐core point process makes it well‐suited for modelling base station placements, where proximity constraints are…”
    Get full text
    Journal Article
  17. 17

    An anti‐interference decision‐making method for communication waveform based on collaborative filtering by Li, Wenji, Zheng, Zhong, Zheng, Hanyu, Guan, Yundi

    Published in Electronics letters (01-11-2024)
    “…Aiming at the problem of efficient and reliable transmission for communication system in complex electromagnetic environment, an anti‐interference…”
    Get full text
    Journal Article
  18. 18

    Two‐mode multiplexed Fourier‐based labels by Kodama, Takahiro, Cincotti, Gabriella

    Published in Electronics letters (01-11-2024)
    “…A two‐mode optical packet switching architecture using an optical multiport mode‐division multiplexing label generator and processor is proposed. By combining…”
    Get full text
    Journal Article
  19. 19

    SVIT‐SSR: A sEMG‐based vision transformer approach for silent speech recognition by Li, Zhao, Ma, Bin, Mao, Weifan, Zhang, Jianxing, Yu, Zhuting, Lu, Yizhou

    Published in Electronics letters (01-11-2024)
    “…Silent speech recognition (SSR) based on surface electromyography (sEMG) is a voice interaction technology proposed for scenarios requiring silent operations…”
    Get full text
    Journal Article
  20. 20

    Safeguarding IoT networks against DDoS attacks using deep learning based zero trust network access by Khan, Murad

    Published in Electronics letters (01-11-2024)
    “…Here, a deep learning‐based zero trust network access (DL‐ZTNA) system to enhance the security of the Message Queuing Telemetry Transport (MQTT) protocol…”
    Get full text
    Journal Article