Evolution of size-dependent flowering in Onopordum illyricum: A quantitative assessment of the role of stochastic selection pressures [PDF]
We explore the evolution of delayed, size-dependent reproduction in the monocarpic perennial Onopordum illyricum, using a range of mathematical models, parameterized with long-term field data.
Briese, D. +3 more
core +1 more source
Security versus Reliability Analysis of Opportunistic Relaying
Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping between legitimate users, when the main link spanning from source to destination has better propagation conditions than the wiretap link
Hanzo, Lajos +3 more
core +1 more source
Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming +2 more
core +1 more source
Isotopic niche variability in macroconsumers of the East Scotia Ridge (Southern Ocean) hydrothermal vents: What more can we learn from an ellipse? [PDF]
Aspects of between-individual trophic niche width can be explored through the isotopic niche concept. In many cases isotopic variability can be influenced by the scale of sampling and biological characteristics including body size or sex.
McGill, R.A.R. +4 more
core +2 more sources
Physical-layer security could be used to effectively combat eavesdroppers and the transmission reliability of the main link could be improved.A wireless relay network with multiple both decode and forward eavesdroppers and relays were considered,in the ...
Mei-ling LI +3 more
doaj +2 more sources
Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical ...
Shen, Weiming +2 more
core +1 more source
Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments [PDF]
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination
Duy, Tran Trung +5 more
core +1 more source
Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks
In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered.
Shen, Weiming +2 more
core +1 more source
Detection of Signals with Chaotic Varying Forms and Low Intercept Probability
Low probability of intercept performance of direct-sequence spread-spectrum system with chaotic spreading sequences is investigated. The energy detectors, synchronous and asynchronous, coherent and non-coherent structures are studied here to detect the ...
V. Р. Tuzlukov
doaj +1 more source
Low Probability of Intercept Communication Based on Structured Radio Beams Using Machine Learning
A low probability of intercept (LPI) communication system based on structured radio beams using machine learning is proposed. Information symbols can be physically encrypted on the structured radio beam realized by superposition of plane spiral orbital ...
Jialiang Zhou +4 more
doaj +1 more source

