2022
DOI: 10.11591/eei.v11i5.4314
|View full text |Cite
|
Sign up to set email alerts
|

Integrating security and privacy in mmWave communications

Abstract: The aim of this paper is to integrate security and privacy in mmWave communications. MmWave communication mechanism access three major key components of secure communication (SC) operations. proposed design for mmWave communication facilitates the detection of the primary signal in physical (PHY) layer to find the spectrum throughput for primary user (PU) and secondary user (SU). The throughput of SC for PU with maximum throughput being recorded at 0.7934 while maximum throughput for SU is recorded at 0.7679. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…The dataset's popularity within the realm of computer vision research is owed to its challenging nature, often presenting intricate scenes and instances of occlusion that test the limits of algorithms. The Caltech pedestrian dataset [23] stands as a definitive reference for evaluating pedestrian detection methodologies. Spanning a continuous ten-hour sequence captured at 640×480 resolution and a frame rate of 30 frames per second, this dataset is meticulously annotated with bounding boxes encompassing both the entire scene and all individuals present.…”
Section: Methodsmentioning
confidence: 99%
“…The dataset's popularity within the realm of computer vision research is owed to its challenging nature, often presenting intricate scenes and instances of occlusion that test the limits of algorithms. The Caltech pedestrian dataset [23] stands as a definitive reference for evaluating pedestrian detection methodologies. Spanning a continuous ten-hour sequence captured at 640×480 resolution and a frame rate of 30 frames per second, this dataset is meticulously annotated with bounding boxes encompassing both the entire scene and all individuals present.…”
Section: Methodsmentioning
confidence: 99%
“…It should serve as a good reference point for how well the default implementation is on the AWS setup compared to the local one. As a third heuristic MurmurHeuristic [12], [13] is chosen and xxHeuristic [14], [15] as the fourth heuristic. Both are recent developments and focus on the throughput.…”
Section: General Purpose Heuristic Functionsmentioning
confidence: 99%
“…Deep learning models use big data to automatically acquire the intrinsic features of the data, which can better represent the intrinsic information within the data while avoiding the uncertainty and complexity associated with human intervention and can using directly use raw data as input to using for learn data as features layer by the layer via multi-layer models. The Long short-term memory network LSTM [8][9], deep trust network DBN [10], and deep convolutional neural network RNN [11] are among the extant research achievements. These approaches have been routinely utilized for short-term home power usage forecasting.…”
Section: Introductionmentioning
confidence: 99%