بحث بسيط
السجلات المعروضة 1 -- 10 من 20
Doppler compensation for AF two way relaying over time varying UWA channels
(
IEEE
, 2014 , Conference Paper)
In this paper, we consider Doppler compensation for time varying underwater acoustic channels. The underlying system model comprises two sources, S1 and S2, communicating with each other through a relay, R. The transmission ...
Physical layer secrecy performance of multiple antennas transmission with partial legitimate user CSI
(
Institution of Engineering and Technology
, 2019 , Article)
Conventional beamforming transmission techniques can enhance physical layer secrecy performance while requiring the full channel state information (CSI) of legitimate users and even that of eavesdroppers at the transmitter. ...
Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
On the Performance of Tactical Communication Interception Using Military Full Duplex Radios
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Advances in the design of Full-Duplex (FD) transceivers with low residual Self-Interference (SI) levels has led to their deployment in various wireless communication applications. One promising field that FD transceivers ...
Throughput of a cooperative energy harvesting secondary user in cognitive radio networks
(
Wiley Blackwell
, 2016 , Article)
This paper investigates the maximum throughput of a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU is assumed to be an energy harvesting node, which harvests energy packets from the ...
Secure multiple-users transmission using multi-path directional modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
A Matlab/Simulink-Based Average-Value Model of Multi-Terminal HVDC Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Multi-terminal High-Voltage Direct Current (MTDC) networks are emerging as the promising technology in modern transmission systems for efficient and bulky renewable energy sources transfer over long distances. Nonetheless, ...
Efficient online WiFi delivery of layered-coding media using inter-layer network coding
(
IEEE
, 2011 , Conference Paper)
A primary challenge in multicasting video in a wireless LAN to multiple clients is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Distributed cross-layer optimization for healthcare monitoring applications
(
IEEE Computer Society
, 2014 , Conference Paper)
Mobile Health (mHealth) systems leverage wireless and mobile communication technologies to provide healthcare stakeholders with innovative tools and solutions that can revolutionize healthcare provisioning. Body Area Sensor ...