Optimizing secure multimedia communication in embedded systems a parallel convolutional neural network approach to RIS and D2D resource allocation. [PDF]
Wang X, Rao S, Zhang L.
europepmc +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
Effect of opioid-free versus opioid-based anaesthesia among surgical patients in public health care centers: A community medicine perspective. [PDF]
Shukla A, Minarey N, Bhalavi M, Jain P.
europepmc +1 more source
A server-assisted secure blockchain model for residential demand response in smart grids. [PDF]
Ghosh A +3 more
europepmc +1 more source
Related searches:
Effective secrecy throughput analysis of relay-assisted free-space optical communications
Physical Communication, 2019Abstract We evaluate the effective secrecy throughput (EST) of multiple-input-multiple-output relay-assisted free-space optical communication, where legitimate nodes (Alice, Relays, and Bob) communicate in the presence of multiple Eavesdroppers (Eves) under two different weather conditions, namely clear weather with weak turbulence and light fog with
Marcos Eduardo Pivaro Monteiro +2 more
exaly +2 more sources
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay
2022 International Conference on Networking and Network Applications (NaNA), 2022Yichuan Wang +2 more
exaly +2 more sources
Effective Secrecy Throughput Analysis Over Underwater Wireless Optical Channel
2023 International Conference on Electrical, Computer and Communication Engineering (ECCE), 2023M K Kundu, A S M Badrudduza
exaly +2 more sources

