بحث بسيط
السجلات المعروضة 11 -- 20 من 36
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
An evolutionary game theoretic approach for cooperative spectrum sensing
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Many spectrum sensing techniques have been proposed to allow a secondary user (SU) to utilize a primary user's (PU) spectrum through opportunistic access. However, few of them have considered the tradeoff between accuracy ...
QUMESH: Wireless mesh network deployment and configuration in harsh environment
(
IEEE
, 2012 , Conference Paper)
The link delivery probability in a wireless mesh network is most accurately determined only by experiment, as it depends on many factors, including environment characteristics, transmission power, distance between transmitter ...
Area spectral efficiency of underlay cognitive radio transmission over rayleigh fading channels
(
IEEE
, 2013 , Conference Paper)
Cognitive radio is a promising technology to improve the spectrum utilization by allowing the unlicensed (secondary) user share a frequency bandwidth with the licensed (primary) owner under the condition that no harmful ...
Performance enhancement of relay-assisted communications via binary feedback
(
IEEE
, 2004 , Conference Paper)
This paper proposes a modified two-hop wireless communication system and studies its performance. The modified system has a reliable feedback channel that carries a binary signal from the receiver to inform the transmitter ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...
Analysis of cell spectral efficiency of infrastructure relay-enhanced cellular system
(
IEEE
, 2011 , Conference Paper)
In this paper, we investigate the downlink spectral efficiency of infrastructure relay-enhanced cellular systems. In particular, we use the average achieved spectral efficiency at an arbitrary mobile receiver in presence ...
Performance analysis of selective cooperation in underlay cognitive networks over Rayleigh channels
(
IEEE
, 2011 , Conference Paper)
Underlay cognitive networks should follow strict interference thresholds to operate in parallel with primary networks. This constraint limits their transmission power and eventually the area of coverage. Therefore, it is ...