Search
Search Results
-
An extension of Cover–Chiang work on point to point channel to less noisy broadcast channel and analysis of the receivers cognition impacts
Information-theoretic analysis of the communication systems performances is of practical and theoretical importance. In this paper, (i) Specifically,...
-
Identification over quantum broadcast channels
Identification over quantum broadcast channels is considered. As opposed to the information transmission task, the decoder only identifies whether a...
-
Active Rendezvous Broadcast Algorithm Based on Channel Weight in Cognitive Radio Ad Hoc Networks
AbstractChannel rendezvous is an important part of broadcast algorithms in cognitive radio ad hoc networks (CRAHNs). To ensure broadcast and network...
-
Advancing quantum broadcast performance in noisy environments: a generalized approach with 4n-qubit cluster states
This study presents two quantum broadcast protocols for the transmission of two qubits utilizing cluster states as the quantum channel to two...
-
Attention-based neural joint source-channel coding of text for point to point and broadcast channel
In this work, we consider the transmissions of structured data such as text over a noisy channel and correlated texts over a broadcast channel. As...
-
Application of broadcast RTK for automated static correction in 3D sub-bottom profiling
Various types of 3D sub-bottom profilers (SBPs) have been developed to widen the swath coverage of conventional single-channel SBPs. Nevertheless,...
-
Timestamp system for causal broadcast communication
In unreliable asynchronous distributed systems with failures, achieving a causal view of the system across all processes is a challenging task. The...
-
Hardware-Based Satellite Network Broadcast Storm Suppression Method
Satellite networks provide high-bandwidth, wide-coverage network services that complement ground networks.However, multitudinous loop links in...
-
I-SBA: an improved SBA broadcast protocol to minimize forwarding for wireless ad-hoc networks
Broadcasting is one of the basic data transmission methods in wireless ad-hoc networks, used for various purposes including fundamental network...
-
Beamforming design for covert broadcast communication with hidden adversary
This paper explores covert broadcast communication in a challenging situation in which the transmitter, Alice, faces uncertainty regarding the...
-
Blockchain broadcast proxy ReEncryption in cloud environment for secure data sharing
The conditional proxy broadcast ReEncryption mechanism enables the user to periodically re-encrypt the cipher-text. When a sender generates the key,...
-
Dynamic Multiple-Message Broadcast: Bounding Throughput in the Affectance Model
We study a dynamic version of the Multiple-Message Broadcast problem, where packets are continuously injected in network nodes for dissemination...
-
Efficient controlled quantum broadcast protocol using 6n-qubit cluster state in noisy channels
This article introduces two controlled quantum broadcast protocols which they utilize 6-qubit and 6 n -qubit (generalized scheme) cluster states as the...
-
‘UPI Chalega’ campaign: significance of broadcast media, promoting digital payment system in West Bengal
Information and communication technology (ICT) has significantly changed social and cultural engagement and is making a digitally empowered society...
-
On the Power of an Honest Majority in Three-Party Computation Without Broadcast
Fully secure multiparty computation (MPC) allows a set of parties to compute some function of their inputs, while guaranteeing correctness, privacy,...
-
Anonymous attribute-based broadcast encryption with hidden multiple access structures
Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...
-
Efficient broadcast scheduling at mobile cloud edges for supporting news-broadcast-on-demand over P2P streaming
The enhanced mobile broadband (eMBB) of 5G drives the News-Broadcast-on-Demand (NBoD) service to be delivered to mobile users in high quality video...
-
Lightweight secure authentication protocol for automatic dependent surveillance broadcast system
This article highlights the importance of Air Traffic Control in ensuring the security and efficiency of international aviation operations....
-
Only overlay text: novel features for TV news broadcast video segmentation
Segmentation of television news videos into programs and stories (after removing advertisements) is a necessary first step for news broadcast...
-
ADS-B Broadcast Authentication
Since the ADS-B communication protocol does not have an inherent message authentication mechanism, ADS-B messages are vulnerable to message injection...