Search
Now showing items 1-6 of 6
A downlink index-modulation based nonorthogonal multiple access scheme
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Massive connectivity and spectral efficiency are among the main defining terms of the future communications era. Therefore, revolutionary technologies are required to keep up with the connectivity and spectrum demands. ...
On the Error Performance of Non-orthogonal Multiple Access Systems
(
IEEE Computer Society
, 2020 , Conference Paper)
Unlike orthogonal multiple access schemes, non-orthogonal (NOMA) ones have arisen as an appealing solution to meet the requirements of the upcoming era of massive connectivity. In NOMA schemes, users are allowed to ...
On physical layer security of correlated multiantenna cognitive radio receivers
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely spaced and often experience correlation among them. In this work, the secrecy performance of correlated multiantenna CR ...
Secrecy Performance Analysis of Cooperative NOMA system with multiple DF Relays
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this paper, we derive the Secrecy Outage Probability (SOP) and Strictly Positive Secrecy Capacity (SPSC) of cooperative Non Orthogonal Multiple Access (NOMA) in the presence of K Decode and Forward (DF) relays and ...
Secure Performance of DF Relaying in Cooperative NOMA over Rician Fading Channels
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this paper, a Decode-and-Forward (DF) relaying system for Non Orthogonal Multiple Access (NOMA) networks is considered, where the transmitted information between the relay and NOMA users can be overheard by an eavesdropper. ...
IoT Anti-Jamming Strategy Using Game Theory and Neural Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...