ﻻ يوجد ملخص باللغة العربية
This paper discusses the problem of securing the transmissions of multiple ground users against eavesdropping attacks. We propose and optimize the deployment of a single unmanned aerial vehicle (UAV), which serves as an aerial relay between the user cluster and the base station. The focus is on maximizing the secrecy energy efficiency by jointly optimizing the uplink transmission powers of the ground users and the position of the UAV. The joint optimization problem is nonconvex; therefore we split it into two subproblems and solve them using an iterative algorithm.
This paper investigates the problem of detection and classification of unmanned aerial vehicles (UAVs) in the presence of wireless interference signals using a passive radio frequency (RF) surveillance system. The system uses a multistage detector to
In this paper, we investigate an open topic of a multiuser single-input-multiple-output (SIMO) generalized frequency division multiplexing (GFDM) system in the presence of carrier frequency offsets (CFOs) and in-phase/quadrature-phase (IQ) imbalances
The Internet of Things (IoT) will soon be omnipresent and billions of sensors and actuators will support our industries and well-being. IoT devices are embedded systems that are connected using wireless technology for most of the cases. The availabil
Rate-Splitting Multiple Access (RSMA), relying on multi-antenna Rate-Splitting (RS) techniques, has emerged as a powerful strategy for multi-user multi-antenna systems. In this paper, RSMA is introduced as a unified multiple access for multi-antenna
In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimat