Results 41 to 50 of about 54,785 (276)
Security-Reliability Analysis in CR-NOMA IoT Network Under I/Q Imbalance
This paper presents a controllable analysis framework for evaluating the reliability and security of underlay cognitive radio networks (CRs) relying on non-orthogonal multiple access (NOMA).
Hung Nguyen +5 more
doaj +1 more source
On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol [PDF]
This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies.
Tran, Thanh-Nam, Vozňák, Miroslav
core +1 more source
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming +4 more
core +1 more source
Half-duplex energy harvesting relay network over different fading environment: System performance with effect of hardware impairment [PDF]
In this paper, we introduce a half-duplex (HD) energy harvesting (EH) relay network over the different fading environment with the effect of hardware impairment (HI).
Dong, Si Thien Chau +4 more
core +1 more source
Optimization of Code Rates in SISOME Wiretap Channels
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni +4 more
core +1 more source
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe +5 more
core +2 more sources
Non-orthogonal multiple access (NOMA) has gained attention as a promising multiple access scheme for the Internet of Things (IoT). A typical setting of user ordering in NOMA networks with user priority difference allows a service priority for solely low ...
Waqas Khalid, Heejung Yu
doaj +1 more source
On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels [PDF]
In this paper, we investigate the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code.
Matthew R. Mckay +3 more
core +2 more sources
Efficient Wireless Security Through Jamming, Coding and Routing
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa +3 more
core +1 more source
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad +17 more
wiley +1 more source

