We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 495 results
  1. Secure Communication for RF Energy Harvesting NOMA Relaying Networks with Relay-User Selection Scheme and Optimization

    In this paper, we study the physical layer security (PLS) of a radio frequency energy harvesting (RF EH) non-orthogonal multiple access (NOMA)...

    Van-Long Nguyen, Dac-Binh Ha, ... Symeon Chatzinotas in Mobile Networks and Applications
    Article 28 April 2022
  2. UAV-Terrestrial Communications

    By observing the fact that moving in a straight line is a common flying behavior of UAVs in normal applications, e.g., power line inspections and air...
    Gaofeng Pan, Tingting Li, ... Sheng Ke in UAV Communications: Modeling and Analyses
    Chapter 2024
  3. A Study of Interference Effect on the Performance of RIS-Equipped Source and Relays DF Relay Network

    This paper studies the interference impact on the performance of reconfigurable intelligent surface (RIS)-equipped decode-and-forward (DF) relay...

    Article 02 May 2024
  4. Enhancement of Physical Layer Security for Relay Aided Multihop Communication Using Deep Transfer Learning Technique

    In order to meet the skyrocketing demand for wireless connectivity, fifth-generation (5G) technologies have lately gained a lot of interest....
    Conference paper 2024
  5. Performance analysis of overlay-based cognitive radio networks with MRC/SC and DT/AF/DF

    This paper studies overlay-based cognitive radio networks (ObCRNs) where transmission from a licensed transmitter (LT) to a licensed receiver (LR) is...

    Toi Le-Thanh, Khuong Ho-Van in Wireless Networks
    Article 20 July 2023
  6. Detection of Hidden Dangers in 6G Power Grid Relay Protection Based on Support Vector Machine

    The integration of Industry 5.0 and the advent of sixth-generation (6G) mobile communication systems have significantly enhanced the operational...

    Benyu Li, Pinhao Mo, ... Linbo Zhang in Wireless Personal Communications
    Article 10 May 2024
  7. Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading

    Overlay mechanism offers secondary users (SUs) chances to access licensed spectrum of primary users (PUs) to improve spectrum utilization efficiency....

    Hanh Dang-Ngoc, Khuong Ho-Van, Thiem Do-Dac in Wireless Personal Communications
    Article 24 April 2021
  8. Secured Performance Analysis of Double Scattering MIMO Network

    In this paper, a practical scenario of multicasting through heterogeneous cellular network has been considered. The macro base station of macro cell...

    R. Sultana, M. Z. I. Sarkar, M. S. Hossain in International Journal of Wireless Information Networks
    Article 25 January 2024
  9. Physical Layer Security in MIMO Relay-Based Cognitive Radio Network

    Cognitive radio networks are one of the predominant technologies to solve the spectrum scarcity problem. In this paper we tackle the problem of...
    V. Upadhyay, M. R. Bharti in Intelligent Data Engineering and Analytics
    Conference paper 2023
  10. Secrecy Performance of Amplify-and-Forward Relay Networks with Relay Selection under Nakagami-m Fading

    In this paper, we examine the secrecy outage performance of a dual-hop relay network under Nakagami- m fading. Here, we consider a three-terminal...

    Rashmi Datta, Devendra S. Gurjar, ... Ashraf Hossain in Wireless Personal Communications
    Article 25 January 2020
  11. Secrecy Outage Performance Analysis of DF Cognitive Relay Network With Co-channel Interference

    In this paper, we investigate the secrecy outage performance of the decode-and-forward cognitive relay network with the existence of the co-channel...

    Qiqing Yang, Jie Ding, Anguo Hu in Wireless Personal Communications
    Article 01 April 2019
  12. Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing

    In this paper, we evaluate the secrecy outage performance and throughput of a hybrid cognitive radio network, where a secondary user (SU) accesses...

    Pranabesh Maji, Kuldeep Yadav, ... Sumit Kundu in Wireless Networks
    Article 13 November 2019
  13. Secure 5G downlink NOMA cognitive relay network: joint the impact of imperfect spectrum sensing and outdated CSI

    This article studies the interweave cognitive network with non-orthogonal multiple access (NOMA) principle under the appearance of one eavesdropper....

    Min Zhang, **njie Wang, ... Xuhu Wang in Wireless Networks
    Article 17 January 2024
  14. A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks

    Physical layer security (PLS) has cropped up as a promising solution to secure the wireless network. Cooperative communication is capable of...

    Anil Kumar Kamboj, Poonam **dal, Pankaj Verma in Annals of Telecommunications
    Article 18 April 2024
  15. Performance analysis for multi-RIS UAV NOMA mmWave communication systems

    In this paper, an unmanned aerial vehicle (UAV) nonorthogonal multiple access (NOMA) system operating in millimeter-wave (mmWave) communications...

    Ba Cao Nguyen, Nam Tran Xuan, ... Pham Thanh Hiep in Wireless Networks
    Article 29 October 2022
  16. Evaluation of Physical Layer Security for UAV-Enabled Wireless Networks over \(\alpha -\kappa -\mu \) Fading Channels

    Unmanned aerial vehicle (UAV)-enabled wireless systems are expected for widespread communication applications in future-generation networks because...

    Chi-Bao Le, Sang Quang Nguyen in Wireless Personal Communications
    Article 12 September 2022
  17. Multicast Network Security with Asymmetric Cooperative Relaying

    Dilip Kumar Sarker, Md. Zahurul Islam Sarkar, ... Rezwana Sultana in International Journal of Wireless Information Networks
    Article 14 June 2022
  18. Energy harvesting relay selection and power allocation in cooperative secure NOMA networks with imperfect SIC over Nakagami-m channel

    In this paper, we consider a cooperative non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation over...

    Article 24 March 2022
  19. On the Security of RF-Based IoT Network with Randomly Located Eavesdropper

    Internet of Things (IoT) environments are comprised of a variety of electronic objects that transmit radio frequency (RF) signals. It further...
    Conference paper 2023
Did you find what you were looking for? Share feedback.