Results 31 to 40 of about 363,353 (192)

Evolution of size-dependent flowering in Onopordum illyricum: A quantitative assessment of the role of stochastic selection pressures [PDF]

open access: yes, 1999
We explore the evolution of delayed, size-dependent reproduction in the monocarpic perennial Onopordum illyricum, using a range of mathematical models, parameterized with long-term field data.
Briese, D.   +3 more
core   +1 more source

Security versus Reliability Analysis of Opportunistic Relaying

open access: yes, 2013
Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping between legitimate users, when the main link spanning from source to destination has better propagation conditions than the wiretap link
Hanzo, Lajos   +3 more
core   +1 more source

Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

open access: yes, 2013
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming   +2 more
core   +1 more source

Isotopic niche variability in macroconsumers of the East Scotia Ridge (Southern Ocean) hydrothermal vents: What more can we learn from an ellipse? [PDF]

open access: yes, 2016
Aspects of between-individual trophic niche width can be explored through the isotopic niche concept. In many cases isotopic variability can be influenced by the scale of sampling and biological characteristics including body size or sex.
McGill, R.A.R.   +4 more
core   +2 more sources

Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay

open access: yesTongxin xuebao, 2017
Physical-layer security could be used to effectively combat eavesdroppers and the transmission reliability of the main link could be improved.A wireless relay network with multiple both decode and forward eavesdroppers and relays were considered,in the ...
Mei-ling LI   +3 more
doaj   +2 more sources

Intercept Probability Analysis of Cooperative Wireless Networks with Best Relay Selection in the Presence of Eavesdropping Attack

open access: yes, 2013
Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical ...
Shen, Weiming   +2 more
core   +1 more source

Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments [PDF]

open access: yes, 2019
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination
Duy, Tran Trung   +5 more
core   +1 more source

Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks

open access: yes, 2013
In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered.
Shen, Weiming   +2 more
core   +1 more source

Detection of Signals with Chaotic Varying Forms and Low Intercept Probability

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники
Low probability of intercept performance of direct-sequence spread-spectrum system with chaotic spreading sequences is investigated. The energy detectors, synchronous and asynchronous, coherent and non-coherent structures are studied here to detect the ...
V. Р. Tuzlukov
doaj   +1 more source

Low Probability of Intercept Communication Based on Structured Radio Beams Using Machine Learning

open access: yesIEEE Access, 2019
A low probability of intercept (LPI) communication system based on structured radio beams using machine learning is proposed. Information symbols can be physically encrypted on the structured radio beam realized by superposition of plane spiral orbital ...
Jialiang Zhou   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy