Communications

By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used.

Categories:
362 Views

GENERATION OF MODE SELECTION PROBABILITY - SINGLE RATE CASE, IMPORTANCE OF DIRECT PATH, COMPARISON WITH CONVENTIONAL INCREMENTAL SCHEME

Categories:
131 Views

Bitcoin is a decentralized digital currency that has gained significant attention and growth in recent years. Unlike traditional currencies, Bitcoin does not rely on a centralized authority to control the supply, distribution, and verification of the validity of transactions. Instead, Bitcoin relies on a peer-to- peer network of volunteers to distribute pending transactions and confirmed blocks, verify transactions, and to collectively implement a replicated ledger that everyone agrees on. This peer-to-peer (P2P) network is at the heart of Bitcoin and many other blockchain technologies.

Categories:
731 Views

The Monte Carlo method (MCM) is known as the gold standard technique for uncertainty quantification (UQ). However, it requires a considerable number of simulations leading to excessive computational resources.

Categories:
150 Views

Data and codes for journal paper "MmWave Vehicular Beam Training with Situational Awareness Using Machine Learning" submitted to IEEE Access.

The code assumes Python 3.

Categories:
710 Views

1. Figure S1 shows the plasma frequency profile of the two-layer analytical model of the ionosphere, see Eq. (9) of the main text.

Categories:
217 Views

A spectrally encapsulated orthogonal frequency division multiplexing (SE-OFDM) precoding scheme for short packet transmission that is able to suppress the out-of-band emission (OoBE) while maintaining the advantage of thecyclic prefix (CP)-OFDM is proposed. The SE-OFDM symbol consists of a prefix, an information (I)-symboland a suffix that are generated by head, center and tail matrices, respectively.

Categories:
219 Views

HTTP and DNS sample traffic traces for experimenting of protocol reverse engineering methods.

Categories:
659 Views

The dataset is used in the paper entitled "A distributed Fog node assessment model by using Fuzzy rules learned by XGBoost" as fuzzy rules extracted by XGboost

Categories:
284 Views

Our goal is to find whether a convolutional neural network (CNN) performs better than the existing blind algorithms for image denoising, and, if yes, whether the noise statistics has an effect on the performance gap. We performed automatic identification of noise distribution, over a set of nine possible distributions, namely, Gaussian, log-normal, uniform, exponential, Poisson, salt and pepper, Rayleigh, speckle and Erlang. Next, for each of these noisy image sets, we compared the performance of FFDNet, a CNN based denoising method, with noise clinic, a blind denoising algorithm.

Categories:
2751 Views

Pages