Results 41 to 50 of about 363,353 (192)
Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming [PDF]
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop ...
Dang Hung, Tran Duy, Do Trinh
doaj +1 more source
This article examines the secrecy coding aided wireless communications from a source to a destination in the presence of an eavesdropper from a security-reliability tradeoff (SRT) perspective.
Hanzo, Lajos +3 more
core +1 more source
The evolution of field early-type galaxies to z~0.7 [PDF]
We have measured the Fundamental Plane (FP) parameters for a sample of 30 field early-type galaxies (E/S0) in the redshift range 0 ...
Daddi E. +7 more
core +2 more sources
Simulation Study on Interception Probability of Anti-Torpedo Torpedo [PDF]
In this paper, a simulation study on the hit probability of an anti-torpedo torpedo(ATT) intercepting an incoming torpedo is con-ducted. A mathematical model of anti-torpedo torpedo interception trajectory is established. Through Monte Carlo simulation cal-culation, the influence of four errors on interception probability of anti-torpedo torpedo ...
Zhang, Shifu +3 more
openaire +1 more source
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be
Duy-Hung Ha +4 more
doaj +1 more source
Photon statistics in the macroscopic realm measured without photon-counters [PDF]
In a macroscopic realm, in which photons are too many for being counted by any photon counting detector, photon statistics can be measured by using detectors simply endowed with linear response.
Andreoni, Alessandra, Bondani, Maria
core +2 more sources
For the physical layer security communication scenario in double-layer satellite networks consisting of geostationary earth orbit (GEO) satellite and low earth orbit (LEO) satellite cluster, we propose a robust secure beamforming (BF) algorithm based on ...
WANG Zhenbiao +4 more
doaj +1 more source
Counter-Interception and Counter-Exploitation Features of Noise Radar Technology
In defense applications, the main features of radars are the Low Probability of Intercept (LPI) and the Low Probability of Exploitation (LPE). The counterpart uses more and more capable intercept receivers and signal processors thanks to the ongoing ...
Gaspare Galati +3 more
doaj +1 more source
In this paper, the joint effect of fading and co-channel interference on the secrecy performance of a wireless communications system is studied. Considering a practical setting where a transmitter (Alice) communicates with a multi-antenna legitimate ...
Jules M. Moualeu +2 more
doaj +1 more source
This article proposes a hybrid satellite-terrestrial relaying network (HSTRN) that integrates physical-layer security (PLS), Fountain codes (FCs), non-orthogonal multiple access (NOMA), and partial relay selection (PRS) to enhance system performance in ...
Toan Van Nguyen +4 more
doaj +1 more source

