Search
Now showing items 2401-2410 of 3148
Secure AF Relaying in Power-Constrained UAV Networks
(
IEEE
, 2021 , Conference Paper)
This paper proposes a secure amplify-and-forward (AF) relaying scheme in unmanned aerial vehicle (UAV) networks while accounting for the power consumption limitations of UAVs. Since a UAV's battery life is limited, we ...
Joint secured and robust technique for OFDM systems
(
IEEE
, 2013 , Conference Paper)
This work presents a novel technique for joint secured and robust transmission of orthogonal frequency division multiplexing (OFDM) based communication systems. The proposed system is implemented by developing a new OFDM ...
Secure Medical Data Sharing for Healthcare System
(
IEEE
, 2022 , Conference Paper)
A new generation of advanced information technologies are used nowadays by healthcare systems to provide access to affordable and high-quality healthcare services. However, such services, generally require a large amount ...
Effect of high-velocity scenarios on the performance of MIMO LTE packet scheduling
(
IEEE
, 2011 , Conference Paper)
In this paper we analyze the performance of advanced OFDM packet scheduling techniques based on 3GPP UTRAN Long Term Evolution (LTE) framework for high velocity scenarios. Based on our previous investigations in system ...
Cooperative access schemes for efficient SWIPT transmissions in cognitive radio networks
(
IEEE
, 2015 , Conference Paper)
We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter ...
I/Q imbalance and loop-back self interference effects in full-duplex OFDM DF relays
(
IEEE
, 2015 , Conference Paper)
We analyze the outage probability of dual-hop full-duplex decode-and-forward relaying for an orthogonal frequency division multiplexing system in the presence of I/Q imbalance. We derive accurate analytical approximations ...
Exploiting sparsity of relay-assisted cognitive radio networks
(
IEEE
, 2015 , Conference Paper)
We propose a novel protocol for secondary users based on compressive sensing principles. The secondary user assigned to one of the primary frequency bands is aided by a set of nearby secondary users, which we refer to as ...
Cooperative Machine Learning Techniques for Cloud Intrusion Detection
(
IEEE
, 2021 , Conference Paper)
Cloud computing is attracting a lot of attention in the past few years. Although, even with its wide acceptance, cloud security is still one of the most essential concerns of cloud computing. Many systems have been proposed ...
Data Augmentation for Intrusion Detection and Classification in Cloud Networks
(
IEEE
, 2021 , Conference Paper)
Cloud computing is a paradigm that provides multiple services over the internet with high flexibility in a cost-effective way. However, the growth of cloud-based services comes with major security issues. Recently, machine ...
Sensor network architecture for deployment over low voltage powerlines
(
IEEE
, 2010 , Conference Paper)
This paper presents the design and implementation of an efficient sensor network (SN) over standard powerlines. As an application of the proposed SN, a home security and surveillance system was designed and implemented. ...