Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
User pairing for downlink non-orthogonal multiple access networks using matching algorithm
In this paper, we study the user pairing in a downlink non-orthogonal multiple access
(NOMA) network, where the base station allocates the power to the pairwise users within the …
(NOMA) network, where the base station allocates the power to the pairwise users within the …
Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location
In this correspondence paper, we consider an unmanned aerial vehicle (UAV) equipped
with an air-to-ground friendly jammer assisting secure communications between a legitimate …
with an air-to-ground friendly jammer assisting secure communications between a legitimate …
Matching theory: Applications in wireless communications
Matching theory is a powerful tool to study the formation of dynamic and mutually beneficial
relations among different types of rational and selfish agents. It has been widely used to …
relations among different types of rational and selfish agents. It has been widely used to …
Matching and cheating in device to device communications underlying cellular networks
In device-to-device (D2D) communication, mobile users communicate directly without going
through the base station. D2D commutation has the advantage of improving spectrum …
through the base station. D2D commutation has the advantage of improving spectrum …
Stable task assignment for mobile crowdsensing with budget constraint
In mobile crowdsensing, it is a challenge to assign tasks to appropriate smartphones.
Existing task allocation mechanisms mainly aim at optimizing the global system …
Existing task allocation mechanisms mainly aim at optimizing the global system …
Joint user pairing, subchannel, and power allocation in full-duplex multi-user OFDMA networks
In this paper, the resource allocation and scheduling problem for a full-duplex (FD)
orthogonal frequency-division multiple-access network is studied where an FD base station …
orthogonal frequency-division multiple-access network is studied where an FD base station …
Coloring inductive graphs on-line
S Irani - Algorithmica, 1994 - Springer
In this paper we consider the problem of on-line graph coloring. In an instance of on-line
graph coloring, the nodes are presented one at a time. As each node is presented, its edges …
graph coloring, the nodes are presented one at a time. As each node is presented, its edges …
Distributed channel assignment in cognitive radio networks: Stable matching and walrasian equilibrium
We consider a set of secondary transmitter-receiver pairs in a cognitive radio setting. Based
on channel sensing and access performances, we consider the problem of assigning …
on channel sensing and access performances, we consider the problem of assigning …
Game-theoretic approaches for energy cooperation in energy harvesting small cell networks
Deploying small cells in cellular networks, as a technique for capacity and coverage
enhancement, is an indispensable characteristic of future cellular networks. In this paper …
enhancement, is an indispensable characteristic of future cellular networks. In this paper …