Results 71 to 80 of about 2,366 (166)

Investigating Low Latency Communications With Link-Layer Rate of NOMA Under Nakagami-m Fading Channel in Finite Blocklength Regime

open access: yesIEEE Access
This paper investigates link-layer rate of two-user downlink non-orthogonal multiple access (NOMA) networks under Nakagami-m fading channel with short packet communications.
Muhammad Imran   +4 more
doaj   +1 more source

On the Throughput of Channels that Wear Out

open access: yes, 2018
This work investigates the fundamental limits of communication over a noisy discrete memoryless channel that wears out, in the sense of signal-dependent catastrophic failure.
Tan, Vincent Y. F.   +2 more
core   +1 more source

Diversity versus Multiplexing at Finite Blocklength

open access: yes, 2014
A finite blocklenth analysis of the diversity-multiplexing tradeoff is presented, based on nonasymptotic bounds on the maximum channel coding rate of multiple-antenna block-memoryless Rayleigh-fading channels.The bounds in this paper allow one to ...
Durisi, Giuseppe   +3 more
core   +1 more source

Channel Coding at Low Capacity

open access: yes, 2020
Low-capacity scenarios have become increasingly important in the technology of the Internet of Things (IoT) and the next generation of mobile networks.
Fereydounian, Mohammad   +3 more
core  

Deep Transfer Learning-Based Performance Prediction of URLLC in Independent and Not Necessarily Identically Distributed Interference Networks

open access: yesIEEE Access
In the rapidly evolving sixth-generation (6G) networks, achieving ultra-high reliability for short packets poses a crucial challenge for network designers as classical Shanon capacity bounds become obsolete.
Mujtaba Ghous   +3 more
doaj   +1 more source

Aerial Jamming Against Aerial Eavesdropping for UAV-Assisted Secure NOMA-URLLC Networks

open access: yesIEEE Open Journal of the Communications Society
This paper investigates an unmanned aerial vehicle (UAV)-assisted non-orthogonal multiple access (NOMA) network, where a ground source (GS) communicates with a ground destination (GD) via a decode-and-forward (DF) aerial relay (AR), while an aerial ...
Emmanouel T. Michailidis   +1 more
doaj   +1 more source

Distributed Storage for Data Security

open access: yes, 2014
We study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints.
Bracher, Annina   +2 more
core   +1 more source

Dynamic relay selection for AoI minimization in short packets based full-duplex energy harvesting-IoT networks

open access: yesJournal of King Saud University: Computer and Information Sciences
The burgeoning demand for real-time status updates in the Internet of Things (IoT) underscores the importance of the age of information (AoI). While full-duplex (FD) relaying and energy harvesting (EH) are promising techniques for extending network ...
Mangang Xie   +2 more
doaj   +1 more source

Robust design of reconfigurable intelligent surfaces for parameter estimation in MTC

open access: yesEURASIP Journal on Wireless Communications and Networking
This paper introduces a reconfigurable intelligent surface (RIS) to support parameter estimation in machine-type communications (MTC). We focus on a network where single-antenna sensors transmit spatially correlated measurements to a multiple-antenna ...
Sergi Liesegang   +2 more
doaj   +1 more source

Information Theoretic Analysis of PUF-Based Tamper Protection

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
PUFs enable physical tamper protection for high-assurance devices without needing a continuous power supply that is active over the entire lifetime of the device. Several methods for PUF-based tamper protection have been proposed together with practical
Georg Maringer, Matthias Hiller
doaj   +1 more source

Home - About - Disclaimer - Privacy