Results 41 to 50 of about 363,353 (192)

Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2019
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop ...
Dang Hung, Tran Duy, Do Trinh
doaj   +1 more source

Relay Selection for Wireless Communications Against Eavesdropping: A Security-Reliability Tradeoff Perspective

open access: yes, 2015
This article examines the secrecy coding aided wireless communications from a source to a destination in the presence of an eavesdropper from a security-reliability tradeoff (SRT) perspective.
Hanzo, Lajos   +3 more
core   +1 more source

The evolution of field early-type galaxies to z~0.7 [PDF]

open access: yes, 2001
We have measured the Fundamental Plane (FP) parameters for a sample of 30 field early-type galaxies (E/S0) in the redshift range 0 ...
Daddi E.   +7 more
core   +2 more sources

Simulation Study on Interception Probability of Anti-Torpedo Torpedo [PDF]

open access: yes, 2022
In this paper, a simulation study on the hit probability of an anti-torpedo torpedo(ATT) intercepting an incoming torpedo is con-ducted. A mathematical model of anti-torpedo torpedo interception trajectory is established. Through Monte Carlo simulation cal-culation, the influence of four errors on interception probability of anti-torpedo torpedo ...
Zhang, Shifu   +3 more
openaire   +1 more source

Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection

open access: yesIEEE Access, 2021
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be
Duy-Hung Ha   +4 more
doaj   +1 more source

Photon statistics in the macroscopic realm measured without photon-counters [PDF]

open access: yes, 2009
In a macroscopic realm, in which photons are too many for being counted by any photon counting detector, photon statistics can be measured by using detectors simply endowed with linear response.
Andreoni, Alessandra, Bondani, Maria
core   +2 more sources

Intercept Probability Constrained Robust Secure Beamforming Algorithm for Double‑Layer Satellite Networks

open access: yesShuju Caiji Yu Chuli
For the physical layer security communication scenario in double-layer satellite networks consisting of geostationary earth orbit (GEO) satellite and low earth orbit (LEO) satellite cluster, we propose a robust secure beamforming (BF) algorithm based on ...
WANG Zhenbiao   +4 more
doaj   +1 more source

Counter-Interception and Counter-Exploitation Features of Noise Radar Technology

open access: yesRemote Sensing, 2021
In defense applications, the main features of radars are the Low Probability of Intercept (LPI) and the Low Probability of Exploitation (LPE). The counterpart uses more and more capable intercept receivers and signal processors thanks to the ongoing ...
Gaspare Galati   +3 more
doaj   +1 more source

Intercept Probability Analysis of Wireless Networks in the Presence of Eavesdropping Attack With Co-Channel Interference

open access: yesIEEE Access, 2018
In this paper, the joint effect of fading and co-channel interference on the secrecy performance of a wireless communications system is studied. Considering a practical setting where a transmitter (Alice) communicates with a multi-antenna legitimate ...
Jules M. Moualeu   +2 more
doaj   +1 more source

Security-Reliability Analysis of NOMA-Assisted Hybrid Satellite-Terrestrial Relay Multi-Cast Transmission Networks Using Fountain Codes and Partial Relay Selection with Presence of Multiple Eavesdroppers

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems
This article proposes a hybrid satellite-terrestrial relaying network (HSTRN) that integrates physical-layer security (PLS), Fountain codes (FCs), non-orthogonal multiple access (NOMA), and partial relay selection (PRS) to enhance system performance in ...
Toan Van Nguyen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy