Results 31 to 40 of about 1,371 (180)

Tabu Search for Low-Cost Dynamic Multicast Tree Generation with Quality of Service Guarantees

open access: yesJournal of Intelligent Systems, 2015
In a communication network with a source node, a multicast tree is defined as a tree rooted at the source node and all its leaves being recipients of the multicast originating at the source.
Tahir Muhammad Atif   +3 more
doaj   +1 more source

Evaluation of multi‐user multiple‐input multiple‐output digital beamforming algorithms in B5G/6G low Earth orbit satellite systems

open access: yesInternational Journal of Satellite Communications and Networking, Volume 44, Issue 1, Page 17-33, January/February 2026.
In this paper, we investigate the application of signal‐to‐leakage‐plus‐noise ratio (SLNR) beamforming to low Earth orbit non‐terrestrial networks. The SLNR criterion aims at maximizing the received desired signal power for each user while minimizing the overall interference power caused by each user to all other co‐channel receivers. We show that such
M. Rabih Dakkak   +3 more
wiley   +1 more source

Multiobjective Optimization for Intelligent Reflective Surface-Aided Physical-Layer Multicasting

open access: yesIEEE Open Journal of the Communications Society, 2022
In this paper, we examine the use of intelligent reflective surface (IRS) to reconfigure the wireless propagation environment which assists the physical-layer multicast transmission with simple single-antenna radios in the network.
Yinman Lee
doaj   +1 more source

Optimization-based congestion control for multicast communications [PDF]

open access: yesIEEE Communications Magazine, 2002
Widespread deployment of multicast depends on the existence of congestion control protocols that are provably fair to unicast traffic. In this work, we present an optimization-based congestion control mechanism for single-rate multicast communication with provable fairness properties.
Shapiro, JK, Towsley, D, Kurose, J
openaire   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

An Effective and Efficient Dynamic eMBMS Multicast Grouping Scheduling Algorithm in MBSFNs for Public Safety Scenarios

open access: yesIEEE Access, 2020
The LTE (Long-Term Evolution) eMBMS (evolved Multimedia Broadcast Multicast Service) technology employed in MBSFNs (Multicast Broadcast Single Frequency Networks) has been shown to be capable of considerably increasing the capacity of serving public ...
Siyuan Feng   +4 more
doaj   +1 more source

Secrecy Rate Optimization for Secure Multicast Communications [PDF]

open access: yesIEEE Journal of Selected Topics in Signal Processing, 2016
Recently, physical layer security has been recognized as a new design paradigm to provide security in wireless networks. In contrast to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance security of wireless communications.
Cumanan, Kanapathippillai   +3 more
openaire   +2 more sources

Quantum Key Distribution Networks Design: Overview and Challenges

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar   +2 more
wiley   +1 more source

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks

open access: yesComputers, 2019
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol.
Matthias Carlier   +2 more
doaj   +1 more source

Joint 2‐D LFM Modulation and Mismatched Filter Design in Dual‐Function Radar‐Communication System

open access: yesIET Radar, Sonar &Navigation, Volume 20, Issue 1, January/December 2026.
This paper proposes a joint 2‐D LFM modulation and mismatched filtering design for military‐grade dual‐function radar‐communication systems. The novel scheme modulates data onto both the initial frequency and chirp rate of LFM pulses, boosting data rates whilst preserving the constant‐envelope property critical for high‐power transmission.
Kehao Wang   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy