superimposed information
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 1)

Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 587 ◽  
Author(s):  
Akashkumar Rajaram ◽  
Rui Dinis ◽  
Dushnatha Nalin K. Jayakody ◽  
Marko Beko

This article is focused on implementing simultaneous wireless information and power transmission as a physical layer security measure by using artificial noise. A series of high energy precoded symbols is simultaneously transmitted along with the information symbols over a Rayleigh frequency selective fading channel. The high energy precoded symbols act as an artificial noise for the eavesdroppers. The energy symbols are precoded on the basis of a legitimate user’s channel matrix to form a null space vector, which eliminates the interference of energy symbols at the information symbol receiver antennas, while allowing the rectenna to harvest energy from the superimposed information and energy symbols. We analyze the secrecy rate and error rate performance at the receiver under different circumstances, and we show that the performance of the legitimate user can be improved by using the iterative block decision feedback equalization method at the receiver.


2020 ◽  
pp. 633-638
Author(s):  
Mohammed A. Salem ◽  
◽  
Azlan B. Abd. Aziz ◽  
Mohamad Y. Alias

In this paper, the secrecy performance for a downlink cooperative non-orthogonal multiple access (NOMA) communication system is studied under two cases. In the first case, the presence of an untrusted user is studied. While, the presence of an eavesdropper node is considered in the second case. The base station transmits superimposed information signals to the half-duplex two-way relay node. The relay amplifies-and-forwards the received signal towards the users. This paper studies the effectiveness of two factors on the secrecy performance in terms of secrecy capacity. these factors are the power allocated for each user, and the distance between the untrusted user and the cooperative relay node with respect to the strong user. Moreover, this paper proposes the shared jamming signal strategy in order to enhance the physical layer security of the cooperative NOMA in the presence of an eavesdropper node. Furthermore, simulations of the secrecy capacity are presented and compared with a conventional scheme based on null-steering jamming scheme. Based on the result the proposed technique outperforms the conventional technique in terms the of secrecy capacity.


Author(s):  
A. V. Ivanova

The first attempts to create devices that allow interacting with the imitated reality, as well as augmenting reality with superimposed information, were made at the beginning of the 20th century, the very concept of mixed reality (the “reality-virtuality continuum”), which elements are virtual (VR) and augmented (AR) reality, is quite young (24 years), as well as the market of these technologies. The concept of virtual and augmented reality hasn’t changed radically in the past 30 years, but VR and AR devices and software, and content have gone through a significant evolutionary path, and have already experienced several growth spikes.VR and AR technologies can be applied not only in entertainment and games. Many experts believe that virtual and augmented reality, along with Big Data, cloud technologies, artificial intelligence and some others, will become the key technologies of the 4th industrial revolution. VR and AR also have the potential to become the next big computing platform. Today VR and AR technologies help not only to create conceptually new markets, but also to disrupt existing ones.This article discusses the evolution of the VR and AR concepts and technologies and current market trends. The results of the survey show the key obstacles for the mass distribution of AR and VR technologies: high implementation and operational costs of AR/VR solutions; lack of high-quality content and imperfect devices, implicit effectiveness of their use.Based on the empirical study, a rather extensive list of benefits from using virtual and augmented reality technologies has been drawn up: faster and cheaper learning, training and guiding processes, increase in their efficiency, the reduction of the costs of elements and supplies needed, training support personnel; reducing potential risks to life and health of employees and other people while special training (medical operations and invasive procedures, evacuation, security, rescue in various emergencies) and the related optimization of the compensations; reducing the number of errors and accelerating the processes of assembling, repairing and operating special equipment, searching for information, necessary details, product location in the warehouse; significant reduction of accidents rate, as well as the exploration costs, due to the early identification of malfunctions; accelerating the pace of the designing and prototyping objects, significantly reducing the cost and duration of physical modeling process; improving customer experience, product and trading platforms design, that leads to corresponding increase in volume of sales; improving (simplifying) of communication and increasing its effectiveness.


Author(s):  
Piedad Garrido Picazo ◽  
Jesús Tramullas Saz ◽  
Manuel Coll Villalta

This chapter introduces digital libraries as a means of cultural heritage access and diffusion. It argues that digital libraries, combined with superimposed information techniques, offers a potentially more substantive approach to understanding the historical documentation analysis problem. Furthermore, the authors hope that understanding the documental and technological assumptions constructs through the use of programming and automatic interpreter will not only inform researches of a better scheme for labelling cultural heritage information but also assist in the need of involved other areas such as multiagent systems, pattern matching, information management and information visualization based on content association, to solve the vast majority of problems set out in the work context, and the result is a versatile digital library prototype which covers the cultural heritage information that the users need.


Author(s):  
David W. Archer ◽  
Lois M. L. Delcambre ◽  
Fabio Corubolo ◽  
Lillian Cassel ◽  
Susan Price ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document