بحث بسيط
السجلات المعروضة 1 -- 10 من 33
On the degrees of freedom region of the M x N Interference Channel
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, the K-user MIMO interference channel is considered. The asymmetric DoF region for the channel is studied. The asymmetric DoF represent the set of all achievable DoF combinations {d1, d2,..., dK}. For the ...
Physical layer secrecy performance of multiple antennas transmission with partial legitimate user CSI
(
Institution of Engineering and Technology
, 2019 , Article)
Conventional beamforming transmission techniques can enhance physical layer secrecy performance while requiring the full channel state information (CSI) of legitimate users and even that of eavesdroppers at the transmitter. ...
Progressive image stitching algorithm for vision based automated inspection
(
IEEE Computer Society
, 2016 , Conference Paper)
The increasing number of skyscrapers along with the large number of tall bridges throughout the world also increases the demand of a robust, automated and remotely controlled health monitoring system for civil architectures. ...
Secure multiple-users transmission using multi-path directional modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Unmanned aerial vehicles (UAVs) have attracted great interest in the last few years owing to their ability to cover large areas and access difficult and hazardous target zones, which is not the case of traditional systems ...
Up and away: A visually-controlled easy-to-deploy wireless UAV Cyber-Physical testbed
(
IEEE Computer Society
, 2014 , Conference Paper)
Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motivate ...
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Commercial unmanned aerial vehicles, or drones, are getting increasingly popular in the last few years. The fact that these drones are highly accessible to public may bring a range of security and technical issues to ...
On the Ergodic Secrecy Rate of Massive MIMO Transmission with Partial Legitimate User CSI
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we consider the downlink transmission over a single-cell massive multiple-input-multiple-output (MIMO) system in the presence of multiple single-antenna eavesdroppers (massive MIMOME). We concentrate on the ...
Performances analysis of SEC based transmit diversity systems with MRC receivers
(
IEEE
, 2012 , Conference Paper)
Switch and Examine combining (SEC) diversity scheme is one of the simplest yet efficient diversity schemes. Earlier in [1] and [2], we proposed sequential power loading algorithm to reduce the average power used at the ...