Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cooperative spectrum sensing optimization in energy-harvesting cognitive radio networks
This article focuses on the issue of cooperative spectrum sensing (CSS) in a mobile energy-
harvesting cognitive radio network (EH-CRN), where secondary transmitters (STs) are …
harvesting cognitive radio network (EH-CRN), where secondary transmitters (STs) are …
Throughput maximization of wireless-powered communication networks: An energy threshold approach
In this paper, we consider a wireless-powered communication network (WPCN) where one
mobile hybrid access point (HAP) coordinates the wireless energy transfer to sensor nodes …
mobile hybrid access point (HAP) coordinates the wireless energy transfer to sensor nodes …
Hierarchical cooperation improves delay in cognitive radio networks with heterogeneous mobile secondary nodes
This paper characterizes the throughput and delay performance of Cognitive Radio
Networks (CRNs), where both primary and secondary networks coexist in a unit torus …
Networks (CRNs), where both primary and secondary networks coexist in a unit torus …
Impact of battery charging on spectrum sensing of CRN with energy harvesting
This paper investigates the impact of battery charging on a cognitive radio network (CRN),
where a hybrid overlay-underlay strategy enables mobile secondary nodes to access the …
where a hybrid overlay-underlay strategy enables mobile secondary nodes to access the …
Towards secure and energy-efficient CRNs via embracing interference: A stochastic geometry approach
In a cognitive radio network (CRN), the interference caused by secondary users (SUs) is
conventionally regarded as an obstacle to the throughput of the primary network. However …
conventionally regarded as an obstacle to the throughput of the primary network. However …
Probabilistic key predistribution in mobile networks resilient to node-capture attacks
J Zhao - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
We present a comprehensive analysis on connectivity and resilience of secure sensor
networks under the widely studied q-composite key predistribution scheme. For network …
networks under the widely studied q-composite key predistribution scheme. For network …