بحث بسيط
السجلات المعروضة 11 -- 20 من 33
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
An evolutionary game theoretic approach for cooperative spectrum sensing
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Many spectrum sensing techniques have been proposed to allow a secondary user (SU) to utilize a primary user's (PU) spectrum through opportunistic access. However, few of them have considered the tradeoff between accuracy ...
QUMESH: Wireless mesh network deployment and configuration in harsh environment
(
IEEE
, 2012 , Conference Paper)
The link delivery probability in a wireless mesh network is most accurately determined only by experiment, as it depends on many factors, including environment characteristics, transmission power, distance between transmitter ...
Area spectral efficiency of underlay cognitive radio transmission over rayleigh fading channels
(
IEEE
, 2013 , Conference Paper)
Cognitive radio is a promising technology to improve the spectrum utilization by allowing the unlicensed (secondary) user share a frequency bandwidth with the licensed (primary) owner under the condition that no harmful ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...
Analysis of cell spectral efficiency of infrastructure relay-enhanced cellular system
(
IEEE
, 2011 , Conference Paper)
In this paper, we investigate the downlink spectral efficiency of infrastructure relay-enhanced cellular systems. In particular, we use the average achieved spectral efficiency at an arbitrary mobile receiver in presence ...
Performance analysis of selective cooperation in underlay cognitive networks over Rayleigh channels
(
IEEE
, 2011 , Conference Paper)
Underlay cognitive networks should follow strict interference thresholds to operate in parallel with primary networks. This constraint limits their transmission power and eventually the area of coverage. Therefore, it is ...
Performance analysis of best relay selection scheme for fixed gain cooperative networks in non-identical Nakagami-m channels
(
IEEE
, 2010 , Conference Paper)
Selecting the best relay among all the relays ready to cooperate saves system resources and utilizes the available bandwidth more efficiently compared to the regular all-relay cooperation. This scheme also achieves the ...