Results 11 to 20 of about 1,051 (211)
Integrating Energy Harvesting, Anti-Eavesdropping, and Communication in a Hybrid Beamforming System
This paper proposes a scheme to integrate data communication, wireless energy harvesting and anti-eavesdropping functions into a hybrid beamforming downlink system to satisfy the demand for expanded functionalities in a communication system.
Haoming He, Xin He
doaj +2 more sources
Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical ...
Lizheng Wang +3 more
doaj +1 more source
Phase-Changing Vanadium Oxides for Electromagnetic Radiation Management. [PDF]
Vanadium dioxide's reversible insulator‐to‐metal transition near room temperature enables ultrafast, broadband electromagnetic modulation from ultraviolet to radiofrequencies. With femtosecond switching speeds and cycling endurance exceeding 100 million cycles, VO2 metasurfaces achieve tuneable absorption, beam steering, and polarisation control. These
Taha M, Daeneke T, Walia S.
europepmc +2 more sources
Multi-User Secure Receiving Algorithm Based on Blind Recovery in MIMO Network
In order to optimize the performance of data transmission in multiple input multiple output (MIMO) wireless communication systems, a spread spectrum self-interference system based on channel inverse matrix modulation is proposed.
Yongli An +3 more
doaj +1 more source
Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets
In recent years, physical layer security technology has provided a new way to solve the problem of secure transmissions in wireless communications from an information theory perspective by using physical layer security coding and the inherent ...
Si Zhang +3 more
doaj +1 more source
Shifted LT Code Security Scheme for Partial Information Encryption
The existing physical layer security technology based on fountain codes needs to ensure that the legal channel is superior to the eavesdropping channel; when the quality of the legal channel and the eavesdropping channel are close, the information ...
Si Zhang +3 more
doaj +1 more source
Anti-Eavesdropping for Connected Cars
Physical layer security (PLS) is an essential way to provide security to users in wireless networks against active or passive attacks. The quantification of the provided security is measured through secrecy outage probability and outage probability.
Dhaval Patel, Sagar Kavaiya
openaire +1 more source
Reliability and anti-predator signal eavesdropping across mixed-species flocks of tits. [PDF]
Mobbing is an anti-predator behavior where multiple species collectively harass a predator while vocalizing. These flocks are made up of species whose vocalizations contain information about predator threat (information sources), and those that eavesdrop
Nora V. Carlson +2 more
doaj +1 more source
Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels
In this paper, the statistical characteristics of the multi-cascade κ-μ shadowed fading channels are investigated and analyzed under the classic Wyner’s eavesdropping model.
Xiaohong Wang +4 more
doaj +1 more source
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability characteristics.
Pengkun Wang, Momiao Zhou, Zhizhong Ding
doaj +1 more source

