Results 71 to 80 of about 2,366 (166)
This paper investigates link-layer rate of two-user downlink non-orthogonal multiple access (NOMA) networks under Nakagami-m fading channel with short packet communications.
Muhammad Imran +4 more
doaj +1 more source
On the Throughput of Channels that Wear Out
This work investigates the fundamental limits of communication over a noisy discrete memoryless channel that wears out, in the sense of signal-dependent catastrophic failure.
Tan, Vincent Y. F. +2 more
core +1 more source
Diversity versus Multiplexing at Finite Blocklength
A finite blocklenth analysis of the diversity-multiplexing tradeoff is presented, based on nonasymptotic bounds on the maximum channel coding rate of multiple-antenna block-memoryless Rayleigh-fading channels.The bounds in this paper allow one to ...
Durisi, Giuseppe +3 more
core +1 more source
Channel Coding at Low Capacity
Low-capacity scenarios have become increasingly important in the technology of the Internet of Things (IoT) and the next generation of mobile networks.
Fereydounian, Mohammad +3 more
core
In the rapidly evolving sixth-generation (6G) networks, achieving ultra-high reliability for short packets poses a crucial challenge for network designers as classical Shanon capacity bounds become obsolete.
Mujtaba Ghous +3 more
doaj +1 more source
Aerial Jamming Against Aerial Eavesdropping for UAV-Assisted Secure NOMA-URLLC Networks
This paper investigates an unmanned aerial vehicle (UAV)-assisted non-orthogonal multiple access (NOMA) network, where a ground source (GS) communicates with a ground destination (GD) via a decode-and-forward (DF) aerial relay (AR), while an aerial ...
Emmanouel T. Michailidis +1 more
doaj +1 more source
Distributed Storage for Data Security
We study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints.
Bracher, Annina +2 more
core +1 more source
The burgeoning demand for real-time status updates in the Internet of Things (IoT) underscores the importance of the age of information (AoI). While full-duplex (FD) relaying and energy harvesting (EH) are promising techniques for extending network ...
Mangang Xie +2 more
doaj +1 more source
Robust design of reconfigurable intelligent surfaces for parameter estimation in MTC
This paper introduces a reconfigurable intelligent surface (RIS) to support parameter estimation in machine-type communications (MTC). We focus on a network where single-antenna sensors transmit spatially correlated measurements to a multiple-antenna ...
Sergi Liesegang +2 more
doaj +1 more source
Information Theoretic Analysis of PUF-Based Tamper Protection
PUFs enable physical tamper protection for high-assurance devices without needing a continuous power supply that is active over the entire lifetime of the device. Several methods for PUF-based tamper protection have been proposed together with practical
Georg Maringer, Matthias Hiller
doaj +1 more source

