The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
In this paper, a novel on–off linear quadratic regulator (LQR) control for satellite rendezvous as an example of linear systems with on–off inputs has been proposed for the first time. It simultaneously benefits fro...
详细信息
Two types of Fe-based nanocrystalline powder composite magnetic core for tens of MHz were fabricated and applied to the planar power inductor. One was Fe-Si-B-Nb-Cu-C spherical fine powder composite magnetic core for ...
详细信息
The autonomous driving industry is expected to grow by over 20 times in the coming decade and, thus, motivate researchers to delve into it. The primary focus of their research is to ensure safety, comfort, and efficie...
详细信息
The autonomous driving industry is expected to grow by over 20 times in the coming decade and, thus, motivate researchers to delve into it. The primary focus of their research is to ensure safety, comfort, and efficiency. An autonomous vehicle has several modules responsible for one or more of the aforementioned items. Among these modules, the trajectory planner plays a pivotal role in the safety of the vehicle and the comfort of its passengers. The module is also responsible for respecting kinematic constraints and any applicable road constraints. In this paper, a novel online spatial-temporal graph trajectory planner is introduced to generate safe and comfortable trajectories. First, a spatial-temporal graph is constructed using the autonomous vehicle, its surrounding vehicles, and virtual nodes along the road with respect to the vehicle itself. Next, the graph is forwarded into a sequential network to obtain the desired states. To support the planner, a simple behavioral layer is also presented that determines kinematic constraints for the planner. Furthermore, a novel potential function is also proposed to train the network. Finally, the proposed planner is tested on three different complex driving tasks, and the performance is compared with two frequently used methods. The results show that the proposed planner generates safe and feasible trajectories while achieving similar or longer distances in the forward direction and comparable comfort ride. IEEE
The accelerated spread of the IoT and rapid development of modern communication networks and technologies have connected the physical world with computational elements in the smart home environment. The smart home is ...
详细信息
The aircraft landing problem (ALP) is a challenging scheduling and optimization problem in the industry and engineering, which has attracted attention in recent decades. Existing research has predominantly concentrate...
详细信息
In this paper, two-and-three channel all-optical AND logic gates based on four-wave mixing in a highly nonlinear fiber for 120 Gbps on-off keying signals were designed, simulated, and investigated. Simulation results ...
详细信息
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual gen...
详细信息
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual generation module,including a bank of filters,into an intelligent residual evaluation ***,residual filters are designed based on an improved nonlinear differential algebraic approach so that they are not affected by external *** residual evaluation module is developed based on the suggested series and parallel ***,a new ensemble classification scheme defined as blended learning integrates heterogeneous classifiers to enhance the performance.A wide range of simulations is carried out in a high-fidelity satellite simulator subject to the constant and time-varying actuator faults in the presence of disturbances,manoeuvres,uncertainties,and *** obtained results demonstrate the effectiveness of the proposed robust fault detection and isolation method compared to the traditional nonlinear differential algebraic approach.
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ...
详细信息
作者:
Boumaraf, MessaoudaMerazka, FatihaLISIC Laboratory
Telecommunications Department Electronic and Computer Engineering Faculty USTHB University Algiers Algeria LISIC Laboratory
Telecommunications Department Electrical Engineering Faculty USTHB University Algiers Algeria
This paper presents a speech encryption algorithm utilizing chaotic shift keying alongside error recovery techniques for the G.722.2 codec. The algorithm employs chaotic data interleaving on speech inter-frames to rep...
详细信息
暂无评论