The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is an important issue in the field of wireless channel. In this paper, the security problem of Gaussian MIMO wireless hybrid channel is considered where a transmitter with multiple antennas sends information to an intended receiver with one antenna in the presence of an eavesdropper with multiple antennas. Through utilizing some of the power to produce ‘artificial noise’, the transmitter...
Security is an important issue in the field of wireless communication. In this paper, the security problem of Multiple-inputs Single-output (MISO) wireless channel is considered. To ensure the security of communication, the transmitter utilizes some of the available power to produce 'artificial noise' that only degrades the eavesdropper's channel. But the artificial noise may be invalid possibly due...
The problem we consider is the security communication in MISO (Multiple-input Single-output) scenario. The scenario is connected via wireless signal between two points: the transmitter and the receiver. We assume that transmitter has multiple antennas while receiver has one. In recent papers, they assume that the useful information can be received by the indeed receiver completely but not the eavesdropper...
Security is an important issue in the field of wireless communication. In this paper, the security problem of Single-input Single-output Multiple-helpers (SISOMH) wireless channel is considered. The SISOMH wireless channel, where artificial noise is utilized, is designed to prevent eavesdropping. But the artificial noise may be invalid due to the inherent security weakness. We point out that the SISOMH...
Nowadays wireless sensor networks (WSNs) have attracted a great deal of study due to their low cost and wide-range applications. Most of the sensors used so far are point sensors which have a disc-shaped sensing region. In this paper, we introduce a new type of sensor: the fiber optic cable sensor. Unlike a traditional point sensor, this type of sensor has a rectangular sensing region with a processor...
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, signed integer exponential-Golomb coded (SE) encryption algorithm and context-adaptive variable length coding (CAVLC) encryption algorithm are proposed during the process of the entropy coding. In order to maintain the format compliance, the signs of motion vector...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.