Konferans bildirisi Açık Erişim
Ata, Serdar Ozgur
<?xml version='1.0' encoding='utf-8'?> <resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd"> <identifier identifierType="URL">https://aperta.ulakbim.gov.tr/record/93311</identifier> <creators> <creator> <creatorName>Ata, Serdar Ozgur</creatorName> <givenName>Serdar Ozgur</givenName> <familyName>Ata</familyName> <affiliation>TUBITAK BILGEM, Informat & Informat Secur Res Ctr, Kocaeli, Turkey</affiliation> </creator> </creators> <titles> <title>Secrecy Performance Analysis Over Double Nakagami-M Fading Channels</title> </titles> <publisher>Aperta</publisher> <publicationYear>2018</publicationYear> <dates> <date dateType="Issued">2018-01-01</date> </dates> <resourceType resourceTypeGeneral="Text">Conference paper</resourceType> <alternateIdentifiers> <alternateIdentifier alternateIdentifierType="url">https://aperta.ulakbim.gov.tr/record/93311</alternateIdentifier> </alternateIdentifiers> <relatedIdentifiers> <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.81043/aperta.93310</relatedIdentifier> <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.81043/aperta.93311</relatedIdentifier> </relatedIdentifiers> <rightsList> <rights rightsURI="http://www.opendefinition.org/licenses/cc-by">Creative Commons Attribution</rights> <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights> </rightsList> <descriptions> <description descriptionType="Abstract">Next-generation wireless communication systems with high user mobility inherit cascaded fading channel models, where the fading effects are more severe than classical channel models including Rayleigh and Nakagami-m. In this study, physical layer secrecy/security performance analysis has been investigated over double Nakagami-m fading channels. While analytic results are derived, the closed-form expression of the probability of positive secrecy capacity is obtained, then the exact secrecy outage probability is obtained in the closed-form. Furthermore, computer simulations are given to verify the analytic results.</description> </descriptions> </resource>
Görüntülenme | 7 |
İndirme | 3 |
Veri hacmi | 507 Bytes |
Tekil görüntülenme | 7 |
Tekil indirme | 3 |