Results 81 to 90 of about 4,651 (205)
Zero-Outage Secrecy in Short Packet IoT-Aided Cellular Cooperative Network With EH-NOMA
The zero-outage secrecy with energy harvesting is considered in short packet IoT-aided cellular cooperative networks using the inspired non-orthogonal multiple access (NOMA) strategy.
Hien Quang Ta +3 more
doaj +1 more source
Secure Communication in Millimeter Wave Relaying Networks
The use of relay can expand the coverage of millimeter-wave (mmWave) signals, whereas it may increase the risk of information leakage due to the additional link from source to relay.
Ruiqian Ma +4 more
doaj +1 more source
Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba +4 more
core +1 more source
The proposed study combined the dual attention mechanism with a bidirectional long short‐term memory network (DA‐BiLSTM) for short‐term load forecasting. This technique was tested on two electric load datasets to assess its generalizability. Additionally, the robustness of DA‐BiLSTM was illustrated through comparative analysis with other deep learning ...
Sabiha Rani +7 more
wiley +1 more source
Secrecy and reliability performance of an energy-harvesting-enabled two-user NOMA system
We analyze the secrecy attributes of an energy-harvesting-enabled decode-and-forward relay-based cooperative nonorthogonal multiple access (NOMA)system in the presence of an eavesdropper.
Alok Baranwal +2 more
doaj +1 more source
Secrecy performance analysis on cooperative CR-NOMA network
In order to improve the secrecy performance of communication system and make efficient use of limited spectrum,overlay cognitive radio (OCR) technology was combined with non-orthogonal multiple access (NOMA) technology and the communication model was ...
Zhen YANG, Mengyao ZHU, Youhong FENG
doaj
Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu +4 more
doaj +1 more source
Modify-and-Forward for Securing Cooperative Relay Communications
We proposed a new physical layer technique that can enhance the security of cooperative relay communications. The proposed approach modifies the decoded message at the relay according to the unique channel state between the relay and the destination such
Kim, Sang Wu
core +1 more source
Abstract Floods can increase the risk of adverse health outcomes through multiple pathways, including contamination of food and water. Remotely sensed (RS) inundation extents can help identify regions with expected heightened flood‐related health risks, but variations across inundation data sets and their integration into health risk assessments may ...
Balaji Ramesh +6 more
wiley +1 more source
Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song +4 more
doaj +1 more source

