Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Energy harvesting towards self-powered IoT devices
The internet of things (IoT) manages a large infrastructure of web-enabled smart devices,
small devices that use embedded systems, such as processors, sensors, and …
small devices that use embedded systems, such as processors, sensors, and …
Security in energy harvesting networks: A survey of current solutions and research challenges
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …
Physical layer security in AF-based cooperative SWIPT sensor networks
Physical layer security (PLS) with radio frequency (RF) energy harvesting (EH) in wireless
sensor networks has received significant interest as a technology for secure information …
sensor networks has received significant interest as a technology for secure information …
Future generation communications with game strategies: A comprehensive survey
R Gupta, J Gupta - Computer Communications, 2022 - Elsevier
For an effective, low latency, and ultra reliable pervasive connectivity among next-
generation wireless networks such as Internet of Things (IoT) devices, machine-to-machine …
generation wireless networks such as Internet of Things (IoT) devices, machine-to-machine …
Security-reliability trade-off analysis for rateless codes-based relaying protocols using NOMA, cooperative jamming and partial relay selection
In this paper, we propose secure relaying transmission protocols using rateless codes,
where a source sends encoded packets to two intended destinations via help of …
where a source sends encoded packets to two intended destinations via help of …
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy
In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network
in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and …
in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and …
Secure Transmit Antenna Selection Protocol for MIMO NOMA Networks Over Nakagami-m Channels
In this paper, we consider a multi-input multioutput (MIMO) nonorthogonal multiple access
(NOMA) network consisting of one source and two legitimate users (LUs), so-called near …
(NOMA) network consisting of one source and two legitimate users (LUs), so-called near …
Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami- Fading
In this paper, we investigate downlink cooperative multiple-input single-output wireless
sensor networks with the nonorthogonal multiple access technique and simultaneous …
sensor networks with the nonorthogonal multiple access technique and simultaneous …
Performance analysis of an energy-harvesting IoT system using a UAV friendly jammer and NOMA under cooperative attack
In this article, we consider the information leakage and outage probabilities of a multiple-
input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a …
input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a …
Physical layer security in cognitive radio networks for IoT using UAV with reconfigurable intelligent surfaces
In this paper, the secrecy performance of a cognitive radio networks (CRN) for Internet of
Things (IoT) in the presence of an eavesdropper (EAV) is investigated. In particular, a …
Things (IoT) in the presence of an eavesdropper (EAV) is investigated. In particular, a …