Search
Search Results
-
Secrecy sum rate maximization for UAV-aided NOMA communication systems
This article studies the secure communication of a non-orthogonal multiple access (NOMA) system with the help of an unmanned aerial vehicle (UAV)....
-
Blind reconfigurable intelligent surface-aided fixed non-orthogonal multiple access for intelligent vehicular networks
In intelligent vehicular networks, vehicles should be able to communicate with their surroundings while traveling. This results in more efficient,...
-
Secrecy Capacity Analysis of Cooperative Vehicular Amplify-and-Forward Relay Networks
We exploit the physical layer security aspects to secure a dual-hop cooperative vehicular relaying networks (CVRNs), where a fixed source node sends... -
On Physical Layer Security of Double Shadowed Rician Fading Channels
With the proliferation of fifth-generation (5G) mobile communication wireless networks, the investigation into the performance of physical layer...
-
Physical Layer Security of Non Orthogonal Multiple Access Using Reconfigurable Intelligent Surfaces
In this paper, we propose to improve the physical layer security of non orthogonal multiple access (NOMA) using reconfigurable intelligent surfaces...
-
Secrecy performance analysis of CIOD–OFDM systems over wireless fading channels
Space–time block codes from coordinate interleaved orthogonal designs (CIODs) have been attracted attention due to their capability for...
-
Positioning and power optimisation for UAV-assisted networks in the presence of eavesdroppers: a multi-armed bandit approach
Unmanned aerial vehicles (UAVs) are becoming increasingly attractive for the ambitious expectations for 5G and beyond networks due to their several...
-
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments
In this paper, we analyze the performance of an in-band full-duplex (IBFD) decode-and-forward (DF) two-way relay (TWR) system whose two terminal...
-
Secrecy Outage Analysis of an Untrusted Relaying Energy Harvesting System with Multiple Eavesdroppers
In this paper, we study the secrecy outage probability of an untrusted relaying energy-harvesting system in the presence of an eavesdropper network,...
-
Ris-aided integrated satellite duplex UAV relay terrestrial networks with imperfect hardware and co-channel interference
Increasing the spectrum and time utilization rate is the goal of the next wireless communication networks. This work studies the outage performance...
-
Analysis performance of full duplex two-way systems using assistance of UAV with hardware impairments
Full-duplex (FD) transmission and unmanned aerial vehicle (UAV) communication are techniques that are expected to enhance the spectrum efficiency of...
-
MIMO NOMA with Nonlinear Energy Harvesting and Imperfect Channel Information
Nonorthogonal multiple access (NOMA) superposes several user signals for simultaneous transmission, considerably ameliorating spectral efficiency. To...
-
Loop-Interference Based Full-Duplex Relay Selection
This study proposes and analyses the loop-interference based selection policy for the full-duplex relaying networks. A multiple full-duplex...
-
Performance Analysis of Switch and Stay Combining System Over Fisher Snedecor (F) Fading Channels
In this paper, we analyze the performance of switch and stay combining (SSC) system operating over Fisher Snedecor (F) fading channels. Several...
-
On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access system
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual...
-
ASER Performance Analysis of Decision Threshold-Based Hybrid FSO-RF Turbulent Link
In this paper a novel hybrid Free Space Optical (FSO)-Radio Frequency (RF) model is proposed which is based on the single decision threshold feedback... -
On the Reliability of Interference Limited Unmanned Aerial Vehicles
In this paper, analysis of unmanned aerial vehicles (UAVs) has been presented in the presence of an interfering UAV. Considering the availability of...
-
RSMO: Rider Spider Monkey Optimization-Based Artificial Noise Precoding Technique for Physical Layer Security in 5G Networks
The concern about security in wireless communication is increased, as Fifth Generation (5G) wireless communication is entered into very field of...
-
UAV Relay Communications
This section investigates the secrecy performance of a UAV-aided NOMA network in the context of underlay CR. Specifically, a multi-antenna secondary... -
Secrecy Performance Analysis of Hybrid AF-DF Relaying Under Multi Hop Environment
In this work, a three-hop wireless relaying model comprising of a single source and destination node, along with two relay nodes and an eavesdropper...