About
25
Publications
1,419
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
98
Citations
Introduction
Current institution
Publications
Publications (25)
In this paper, we consider a confidential communication through multi-cellular co-located multiple-input multiple-output (C-MIMO) and distributed MIMO (D-MIMO) networks in the presence of an eavesdropper. The base station (BS) of each cell sends a common stream of information to a group of receivers within the cell and an eavesdropper observes thei...
We consider a single-input multiple-output (SIMO) multiple-access channel (MAC) multi-cellular communication scenario in which two base stations having a group of users each, are situated in two adjacent cells. In order to provide cooperative diversity at the base stations (BSs), multiple relays are used. Each group of users transmits information t...
In this paper, we investigate the impact of diversity and antenna correlations on the secrecy capacity and outage performance of a cognitive radio multicast network over Nakagami-m fading channels analytically. The proposed network consists of single primary and secondary user, multiple primary and secondary receivers, and multiple eavesdroppers. I...
This paper exhibits the confidentiality performance study of a cooperative multicast network consisting of K\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {K...
This paper elucidate the accomplishment of security in wireless multicasting through composite Rayleigh/log-normal shadowing channels under partial relay selection strategy. Same information is transmitted by a source, S to a set of M destination users via K relays, and N eavesdroppers situated nearby the users try to overhear the message. It is as...
A masked communication context is contemplated over multiple-input multiple-output (MIMO) fading channels, in which a transmitter contacts with a group of receivers with the existence of multiple eavesdroppers. The antenna correlation is generally influenced by the antenna spacing and the angular spreading of the arriving radio waves. We have found...
Cognitive radio network is capable of adopting the best wireless channels by dynamic spectrum management avoiding user interference and congestion. In this paper, secure wireless communication scenario is considered through a multiple-input multiple-output (MIMO) cognitive interference radio network over Rayleigh fading channel. It consists of a pr...
We consider a secure wireless multicasting scenario over Generalized \(\kappa -\mu\) fading channels via multiple amplify-and-forward cooperative relays. In the first hop, a source S transmits a common stream of information to a group of K relays. In the second hop, the best relay which has the highest signal-to-noise ratio, forwards the amplified...
This paper presents the secure performance analysis of cellular multicast networks. A mobile user sends a common information to a group of M receivers in the presence of multiple eavesdroppers via a multi-antenna base station. Considering maximal ratio transmission (MRT) with transmit antenna correlation and arbitrary eigenvalue multiplicities at t...
This paper deals with the investigation of the impact of minimum mean-square error (MMSE) and zero-forcing (ZF) equalizations on the performance of secure wireless multicasting. A secure multiple-input multiple-output (MIMO) multicasting scenario is considered in which a source S transmits a common stream of information to a group of M receivers in...
A secure multicasting scenario through selection decode-and-forward
(DF) cooperative relay network is considered over Nakagami-m fading
channel, in which a source S communicates to a group of M
destinations in the presence of N eavesdroppers via a group of K relays. We assume that there are no direct links between source and
destinations as well as...
In this paper, a multicast scenario is considered through selection decode-and-forward cooperative relay networks over Nakagami-m fading channel in which a source communicates with multiple destinations via multiple cooperative relays. A best relay is selected using selection combining technique which communicates with the destinations. The perform...
A confidential communication scenario is considered in which a base station (BS) transmits a common stream of information to a group of users in the presence of multiple eavesdroppers via multiple relays. Multiple relays are used to provide cooperative spatial multiplexing that significantly increases the spectral efficiency with the help of linear...
In this paper, a confidential communication scenario is considered through selection decode-and-forward cooperative relay networks over Rayleigh fading channel in which a source communicates with a destination via multiple relays. A best relay is selected using selection combining technique which communicates with the destination. An eavesdropper o...
An opportunistic relaying strategy is introduced in this paper to enhance the performance of multicasting. The key feature of this work is to provide an additional diversity to the multicast users selecting best relay from a group of multiple relays. It is assumed that there is no direct path between the source and the destinations and communicatio...
This paper is concerned with the analysis of secrecy capacity and secure outage performance of cooperative spatial multiplexing system with the effect of linear equalization. A confidential communication scenario is considered through Rayleigh fading channel in which a number of users communicate with a destination via multiple relays. An eavesdrop...
In this paper, we consider a multicasting scenario in cooperative spatial multiplexing system over Rayleigh fading channel in which a source S transmits a common stream of information to a group of client receivers via K relays. We assume that there is no direct path between S and the client receivers and communication occurs only through the relay...
The linear theory of electromagnetic radiation from plasma-loaded sinusoidally
corrugated backward wave oscillator driven by intense relativistic electron beam has been
developed and analyzed numerically as well as analytically. The more preference is given
on analytical study. A beam-plasma waveguide model has been proposed and studied analytic...