Results 11 to 20 of about 1,051 (211)

Integrating Energy Harvesting, Anti-Eavesdropping, and Communication in a Hybrid Beamforming System

open access: yesIEEE Access
This paper proposes a scheme to integrate data communication, wireless energy harvesting and anti-eavesdropping functions into a hybrid beamforming downlink system to satisfy the demand for expanded functionalities in a communication system.
Haoming He, Xin He
doaj   +2 more sources

Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1

open access: yesApplied Sciences, 2023
Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical ...
Lizheng Wang   +3 more
doaj   +1 more source

Phase-Changing Vanadium Oxides for Electromagnetic Radiation Management. [PDF]

open access: yesSmall Sci
Vanadium dioxide's reversible insulator‐to‐metal transition near room temperature enables ultrafast, broadband electromagnetic modulation from ultraviolet to radiofrequencies. With femtosecond switching speeds and cycling endurance exceeding 100 million cycles, VO2 metasurfaces achieve tuneable absorption, beam steering, and polarisation control. These
Taha M, Daeneke T, Walia S.
europepmc   +2 more sources

Multi-User Secure Receiving Algorithm Based on Blind Recovery in MIMO Network

open access: yesIEEE Access, 2021
In order to optimize the performance of data transmission in multiple input multiple output (MIMO) wireless communication systems, a spread spectrum self-interference system based on channel inverse matrix modulation is proposed.
Yongli An   +3 more
doaj   +1 more source

Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets

open access: yesIEEE Access, 2022
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent ...
Si Zhang   +3 more
doaj   +1 more source

Shifted LT Code Security Scheme for Partial Information Encryption

open access: yesEntropy, 2022
The existing physical layer security technology based on fountain codes needs to ensure that the legal channel is superior to the eavesdropping channel; when the quality of the legal channel and the eavesdropping channel are close, the information ...
Si Zhang   +3 more
doaj   +1 more source

Anti-Eavesdropping for Connected Cars

open access: yes, 2022
Physical layer security (PLS) is an essential way to provide security to users in wireless networks against active or passive attacks. The quantification of the provided security is measured through secrecy outage probability and outage probability.
Dhaval Patel, Sagar Kavaiya
openaire   +1 more source

Reliability and anti-predator signal eavesdropping across mixed-species flocks of tits. [PDF]

open access: yesAnimal Behavior and Cognition, 2020
Mobbing is an anti-predator behavior where multiple species collectively harass a predator while vocalizing. These flocks are made up of species whose vocalizations contain information about predator threat (information sources), and those that eavesdrop
Nora V. Carlson   +2 more
doaj   +1 more source

Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels

open access: yesJournal of Advanced Transportation, 2022
In this paper, the statistical characteristics of the multi-cascade κ-μ shadowed fading channels are investigated and analyzed under the classic Wyner’s eavesdropping model.
Xiaohong Wang   +4 more
doaj   +1 more source

A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks

open access: yesSensors, 2021
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability characteristics.
Pengkun Wang, Momiao Zhou, Zhizhong Ding
doaj   +1 more source

Home - About - Disclaimer - Privacy