بحث بسيط
السجلات المعروضة 41 -- 50 من 103
Up and away: A visually-controlled easy-to-deploy wireless UAV Cyber-Physical testbed
(
IEEE Computer Society
, 2014 , Conference Paper)
Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motivate ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
Multimodal deep learning approach for Joint EEG-EMG Data compression and classification
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
In this paper, we present a joint compression and classification approach of EEG and EMG signals using a deep learning approach. Specifically, we build our system based on the deep autoencoder architecture which is designed ...
On the effect of proportional fairness in energy transfer for wireless powered communication networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Wireless powered communication network (WPCN) is an emerging area of research where energy is transferred from the access point to the mobile terminals in the downlink and information is transferred in the uplink. In the ...
Optimum power and rate allocation in video sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
In a sensor network, each sensor has a limited energy supply. Therefore, it is critical to minimize the power consumed by each sensor to maximize its lifetime. Video sensor networks differ from conventional sensor networks ...
Outage optimal resource allocation for two-hop multiuser multirelay cooperative communication in OFDMA upstream
(
IEEE
, 2011 , Conference Paper)
We investigate an outage optimal adaptive resource allocation scheme for the upstream of two-hop OFDMA based decode-and-forward cooperative relay systems. The objective of this work is to design resource allocation strategy, ...
Optimal spectrum access for a rechargeable cognitive radio user based on energy buffer state
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Performance Evaluation of Hyperledger Fabric
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Blockchain is a distributed secure ledger that eliminates the need for centralized authority to store data. The centralized approach has several limitations as it is a Single-Point-of-Failure and a third-party might be ...
Trading wireless information and power transfer: Relay selection to minimize the outage probability
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from ...