In this paper, the author has given an existence theorem for the resonant equation,-△pu=λ1|u|p-2u+f(u)+h(x),without any Landesman-Lazer conditions on h(x).
Analytical solutions for contaminant transport are widely used for both theoretical and practical purposes.However,many existing solutions are obtained subject to an initial condition of zero concentration,which is of...Analytical solutions for contaminant transport are widely used for both theoretical and practical purposes.However,many existing solutions are obtained subject to an initial condition of zero concentration,which is often unrealistic in many practical cases.This article proposed a stepwise superposition approximation approach to solve the non-zero initial concentration problem for first-type and third-type boundary conditions by using the existing zero initial concentration solution.Theoretical examples showed that the approach was highly efficient if a proper superposition scheme with relative concentration increments was constructed.The key parameter that controlled the convergence speed was the time increment(△t) multiplied by the rate constant(λ).The approach served also as an alternative way to make a convenient concentration calculation even if the non-zero initial concentration solution of a problem was known.展开更多
We study the dynamics of fundamental and double-pole breathers and solitons for the focusing and defocusing nonlinear Schrodinger equation with the sextic operator under non-zero boundary conditions. Our analysis main...We study the dynamics of fundamental and double-pole breathers and solitons for the focusing and defocusing nonlinear Schrodinger equation with the sextic operator under non-zero boundary conditions. Our analysis mainly focuses onthe dynamical properties of simple- and double-pole solutions. Firstly, through verification, we find that solutions undernon-zero boundary conditions can be transformed into solutions under zero boundary conditions, whether in simple-pole ordouble-pole cases. For the focusing case, in the investigation of simple-pole solutions, temporal periodic breather and thespatial-temporal periodic breather are obtained by modulating parameters. Additionally, in the case of multi-pole solitons,we analyze parallel-state solitons, bound-state solitons, and intersecting solitons, providing a brief analysis of their interactions.In the double-pole case, we observe that the two solitons undergo two interactions, resulting in a distinctive “triangle”crest. Furthermore, for the defocusing case, we briefly consider two situations of simple-pole solutions, obtaining one andtwo dark solitons.展开更多
This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of th...This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of the inequality.展开更多
There is no any spin rotational construction for zero spin particle, Casimir operator and the thired component of zero spin particle areandrespectively. Further, there are no spin interactions between zero spin partic...There is no any spin rotational construction for zero spin particle, Casimir operator and the thired component of zero spin particle areandrespectively. Further, there are no spin interactions between zero spin particle and other spin particles. This paper shows: in Spin Topological Space, STS [1], the third component of zero spin particle possesses non-zero eigenvalues besides original zero value, this leads to a miraculous spin interaction phenomenon between zero spin particle and other spin particles. In STS, zero spin particle could "dissolve other spin particles", degrade the values of their Casimir operator, and decay these spin particles into other forms of spin particle.展开更多
For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-block...For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-blocks are unchanged using block position shuffle.For this defect,this paper proposes a fast attack algorithm for JPEG image encryption based on inter-block shuffle and non-zero quantization discrete cosine transformation coefficient attack.The algorithm analyzes the position mapping relationship before and after encryption of image blocks by detecting the pixel values of an image by the designed plaintext image.Then the preliminary attack result of the image blocks can be obtained from the inverse mapping relationship.Finally,the final attack result of the algorithm is generated according to the numbers of non-zero coefficients in each 8×8 block of the preliminary attack result.Every 8×8 block position is related with its number of non-zero discrete cosine transform coefficients in the designed plaintext.It is verified that the main content of the original image could be obtained without knowledge of the encryption algorithm and keys in a relatively short time.展开更多
It is well known that the critical current density of a superconductor depends on its size, shape, nature of doping and the manner of preparation. It is suggested here that the collective effect of such differences fo...It is well known that the critical current density of a superconductor depends on its size, shape, nature of doping and the manner of preparation. It is suggested here that the collective effect of such differences for different samples of the same superconductor is to endow them with different values of the Fermi energy—a single property to which may be attributed the observed variation in their critical current densities. The study reported here extends our earlier work concerned with the generalized BCS equations [Malik, G.P. (2010) Physica B, 405, 3475-3481;Malik, G.P. (2013) WJCMP, 3,103-110]. We develop here for the first time a framework of microscopic equations that incorporates all of the following parameters of a superconductor: temperature, momentum of Cooper pairs, Fermi energy, applied magnetic field and critical current density. As an application of this framework, we address the different values of critical current densities of Bi-2212 for non-zero values of temperature and applied magnetic field that have been reported in the literature.展开更多
We study the heat flow of equation of H-surface with non-zero Dirichlet boundary in the present article. Introducing the "stable set" M2 and "unstable set" M1, we show that there exists a unique gl...We study the heat flow of equation of H-surface with non-zero Dirichlet boundary in the present article. Introducing the "stable set" M2 and "unstable set" M1, we show that there exists a unique global solution provided the initial data belong to M2 and the global solution converges to zero in H^1 exponentially as time goes to infinity. Moreover, we also prove that the local regular solution must blow up at finite time provided the initial data belong to M1.展开更多
This paper aims to investigate the multi-soliton solutions of the coupled Lakshmanan–Porsezian–Daniel equations with variable coefficients under nonzero boundary conditions.These equations are utilized to model the ...This paper aims to investigate the multi-soliton solutions of the coupled Lakshmanan–Porsezian–Daniel equations with variable coefficients under nonzero boundary conditions.These equations are utilized to model the phenomenon of nonlinear waves propagating simultaneously in non-uniform optical fibers.By analyzing the Lax pair and the Riemann–Hilbert problem,we aim to provide a comprehensive understanding of the dynamics and interactions of solitons of this system.Furthermore,we study the impacts of group velocity dispersion or the fourth-order dispersion on soliton behaviors.Through appropriate parameter selections,we observe various nonlinear phenomena,including the disappearance of solitons after interaction and their transformation into breather-like solitons,as well as the propagation of breathers with variable periodicity and interactions between solitons with variable periodicities.展开更多
The aim of this paper is to present an analytical expression for the streamwise velocity distribution in a non-uniform flow in the presence of waves; the correlation between the horizontal and vertical velocity compon...The aim of this paper is to present an analytical expression for the streamwise velocity distribution in a non-uniform flow in the presence of waves; the correlation between the horizontal and vertical velocity components has been compreheusively examined. Different from previous researches which attributed the deviation of velocity from the classical log-law to the wave Reynolds stress, i.e. - ρ uv^- only, this study demonstrates that the momentum flux caused by mean velocities, i.e., u^- and v^-, is also responsible for the velocity deviation, and it is found that the streamwise velocity for a flow in the presence of non-zero wall-normal velocity does not follow the classical log-law, but the modified log-law proposed in this study based on simplified mixing-length theorem. The validity of the modified log-law has been verified by use of available experimental data from published sources for combined wave-current flows, and good agreement between the predicted and observed velocity profiles has been achieved.展开更多
In this paper, an urban economic growth model with endogenous infrastructure allocation is given by introducing the two-variable utility function for city's inhabitant. A twodimensional dynamical system is obtained b...In this paper, an urban economic growth model with endogenous infrastructure allocation is given by introducing the two-variable utility function for city's inhabitant. A twodimensional dynamical system is obtained by solving the utility maximization problem and it is proved that this system has the unique non-zero equilibrium which is a saddle. The model has the unique optimal growth and an optimal rate of infrastructure allocation.展开更多
The aim of this paper is to establish the existence of at least two non-zero homoclinic solutions for a nonlinear Laplacian difference equation without using AmbrosettiRabinowitz type-conditions. The main tools are mo...The aim of this paper is to establish the existence of at least two non-zero homoclinic solutions for a nonlinear Laplacian difference equation without using AmbrosettiRabinowitz type-conditions. The main tools are mountain pass theorem and Palais-Smale compactness condition involving suitable functionals.展开更多
In recent years,with rapid increases in the number of vehicles in China,the contribution of vehicle exhaust emissions to air pollution has become increasingly prominent.To achieve the precise control of emissions,on-r...In recent years,with rapid increases in the number of vehicles in China,the contribution of vehicle exhaust emissions to air pollution has become increasingly prominent.To achieve the precise control of emissions,on-road remote sensing(RS)technology has been developed and applied for law enforcement and supervision.However,data quality is still an existing issue affecting the development and application of RS.In this study,the RS data from a cross-road RS system used at a single site(from 2012 to 2015)were collected,the data screening process was reviewed,the issues with data quality were summarized,a new method of data screening and calibration was proposed,and the effectiveness of the improved data quality control methods was finally evaluated.The results showed that this method reduces the skewness and kurtosis of the data distribution by up to nearly 67%,which restores the actual characteristics of exhaust diffusion and is conducive to the identification of actual clean and high-emission vehicles.The annual variability of emission factors of nitric oxide decreases by 60%-on average-eliminating the annual drift of fleet emissions and improving data reliability.展开更多
The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quan...The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quantify as the diversity scheme is more efficient in enhancing the security of cellular multicast network mitigating the effects of correlation. Motivated by this issue, this paper considers a secure wireless multicasting scenario through correlated cellular networks in the presence of multiple eavesdroppers. The selection combining (SC) and switch and stay combining (SSC) techniques are considered in dual arbitrarily correlated Nakagami-m fading channels. The closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived to understand the insight into the effects of correlation on the SC and SSC diversity schemes and to quantify which diversity scheme is more efficient in enhancing the security of correlated multicast networks. The results show that, although the diversity gain reduces the effect of correlation, the diversity gain provided by the SC diversity scheme is more significant in mitigating the effect of correlation compared to the SSC diversity scheme. Due to the selection mechanism of SC diversity, it is more sensitive to the change of SNR of the eavesdropper’s channel compared to the case of the SSC diversity scheme.展开更多
The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity g...The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting.展开更多
The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by th...The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by these advantages of OSFBC-OFDM system, this paper considers a secure wireless multicasting scenario through multiple-input multiple-output (MIMO) OFDM system employing OSFBC over frequency selective α-μ fading channels. The authors are interested to protect the desired signals from eavesdropping considering the impact of the number of multicast users and eavesdroppers, and the fading parameters α and μ. A mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multi-casting (SOPM) to ensure the security in the presence of multiple eaves-droppers. The results show that the security in MIMO OSFBC OFDM system over α-μ fading is more sensitive to the magnitude of α and μ and this effect increases in the high signal-to-noise ratio (SNR) region of the main channel.展开更多
The performance of Rayleigh fading channels is substantially impacted by the impacts of relays, antennas, and the number of branches. Opportunistic relaying is a potent technique for enhancing the effects of the afore...The performance of Rayleigh fading channels is substantially impacted by the impacts of relays, antennas, and the number of branches. Opportunistic relaying is a potent technique for enhancing the effects of the aforementioned factors while enhancing the performance of fading channels. Due to these issues, a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is taken into consideration in this study. So the investigation of a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is the focus of this paper. The primary goals of this study are to maximize security in wireless multicasting while minimizing security loss caused by the effects of relays, branches at destinations and wiretappers, as well as multicast users and wiretappers through opportunistic relaying. To comprehend the insight effects of prior parameters, the closed form analytical expressions are constructed for the probability of non-zero secrecy multicast capacity (PNSMC), ergodic secrecy multicast capacity (ESMC), and secure outage probability for multicasting (SOPM). The findings demonstrate that opportunistic relaying is a successful method for reducing the loss of security in multicasting.展开更多
基金Foundation item: Supported by the Sichuan Educational Comittee Science Foundation for Youths(08ZB002) Supported by the National Secience Foundation of Yibin University(2008Z02)
文摘In this paper, the author has given an existence theorem for the resonant equation,-△pu=λ1|u|p-2u+f(u)+h(x),without any Landesman-Lazer conditions on h(x).
基金supported by the National Natural Science Foundation of China (No. 40872151)the Key Project in the National Science and Technology Pillar Program of China (No. 2006BAC06B05)
文摘Analytical solutions for contaminant transport are widely used for both theoretical and practical purposes.However,many existing solutions are obtained subject to an initial condition of zero concentration,which is often unrealistic in many practical cases.This article proposed a stepwise superposition approximation approach to solve the non-zero initial concentration problem for first-type and third-type boundary conditions by using the existing zero initial concentration solution.Theoretical examples showed that the approach was highly efficient if a proper superposition scheme with relative concentration increments was constructed.The key parameter that controlled the convergence speed was the time increment(△t) multiplied by the rate constant(λ).The approach served also as an alternative way to make a convenient concentration calculation even if the non-zero initial concentration solution of a problem was known.
基金the Fundamental Research Funds for the Central Universities(Grant No.2024MS126).
文摘We study the dynamics of fundamental and double-pole breathers and solitons for the focusing and defocusing nonlinear Schrodinger equation with the sextic operator under non-zero boundary conditions. Our analysis mainly focuses onthe dynamical properties of simple- and double-pole solutions. Firstly, through verification, we find that solutions undernon-zero boundary conditions can be transformed into solutions under zero boundary conditions, whether in simple-pole ordouble-pole cases. For the focusing case, in the investigation of simple-pole solutions, temporal periodic breather and thespatial-temporal periodic breather are obtained by modulating parameters. Additionally, in the case of multi-pole solitons,we analyze parallel-state solitons, bound-state solitons, and intersecting solitons, providing a brief analysis of their interactions.In the double-pole case, we observe that the two solitons undergo two interactions, resulting in a distinctive “triangle”crest. Furthermore, for the defocusing case, we briefly consider two situations of simple-pole solutions, obtaining one andtwo dark solitons.
文摘This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of the inequality.
文摘There is no any spin rotational construction for zero spin particle, Casimir operator and the thired component of zero spin particle areandrespectively. Further, there are no spin interactions between zero spin particle and other spin particles. This paper shows: in Spin Topological Space, STS [1], the third component of zero spin particle possesses non-zero eigenvalues besides original zero value, this leads to a miraculous spin interaction phenomenon between zero spin particle and other spin particles. In STS, zero spin particle could "dissolve other spin particles", degrade the values of their Casimir operator, and decay these spin particles into other forms of spin particle.
文摘For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-blocks are unchanged using block position shuffle.For this defect,this paper proposes a fast attack algorithm for JPEG image encryption based on inter-block shuffle and non-zero quantization discrete cosine transformation coefficient attack.The algorithm analyzes the position mapping relationship before and after encryption of image blocks by detecting the pixel values of an image by the designed plaintext image.Then the preliminary attack result of the image blocks can be obtained from the inverse mapping relationship.Finally,the final attack result of the algorithm is generated according to the numbers of non-zero coefficients in each 8×8 block of the preliminary attack result.Every 8×8 block position is related with its number of non-zero discrete cosine transform coefficients in the designed plaintext.It is verified that the main content of the original image could be obtained without knowledge of the encryption algorithm and keys in a relatively short time.
文摘It is well known that the critical current density of a superconductor depends on its size, shape, nature of doping and the manner of preparation. It is suggested here that the collective effect of such differences for different samples of the same superconductor is to endow them with different values of the Fermi energy—a single property to which may be attributed the observed variation in their critical current densities. The study reported here extends our earlier work concerned with the generalized BCS equations [Malik, G.P. (2010) Physica B, 405, 3475-3481;Malik, G.P. (2013) WJCMP, 3,103-110]. We develop here for the first time a framework of microscopic equations that incorporates all of the following parameters of a superconductor: temperature, momentum of Cooper pairs, Fermi energy, applied magnetic field and critical current density. As an application of this framework, we address the different values of critical current densities of Bi-2212 for non-zero values of temperature and applied magnetic field that have been reported in the literature.
基金supported by National Natural Science Foundation of China(11701193,11671086)Natural Science Foundation of Fujian Province(2018J05005)+3 种基金Program for Innovative Research Team in Science and Technology in Fujian Province University Quanzhou High-Level Talents Support Plan(2017ZT012)part supported by National Natural Science Foundation of China(11271305,11531010)Jiankai Xu’s research was in part supported by National Natural Science Foundation(11671086,11871208)Natural Science Foundation of Hunan Province(2018JJ2159)
文摘We study the heat flow of equation of H-surface with non-zero Dirichlet boundary in the present article. Introducing the "stable set" M2 and "unstable set" M1, we show that there exists a unique global solution provided the initial data belong to M2 and the global solution converges to zero in H^1 exponentially as time goes to infinity. Moreover, we also prove that the local regular solution must blow up at finite time provided the initial data belong to M1.
基金supported by the Natural Science Foundation of Hebei Province,China (Grant No.A2021502004)the Fundamental Research Funds for the Central Universities (Grant No.2024MS126).
文摘This paper aims to investigate the multi-soliton solutions of the coupled Lakshmanan–Porsezian–Daniel equations with variable coefficients under nonzero boundary conditions.These equations are utilized to model the phenomenon of nonlinear waves propagating simultaneously in non-uniform optical fibers.By analyzing the Lax pair and the Riemann–Hilbert problem,we aim to provide a comprehensive understanding of the dynamics and interactions of solitons of this system.Furthermore,we study the impacts of group velocity dispersion or the fourth-order dispersion on soliton behaviors.Through appropriate parameter selections,we observe various nonlinear phenomena,including the disappearance of solitons after interaction and their transformation into breather-like solitons,as well as the propagation of breathers with variable periodicity and interactions between solitons with variable periodicities.
文摘The aim of this paper is to present an analytical expression for the streamwise velocity distribution in a non-uniform flow in the presence of waves; the correlation between the horizontal and vertical velocity components has been compreheusively examined. Different from previous researches which attributed the deviation of velocity from the classical log-law to the wave Reynolds stress, i.e. - ρ uv^- only, this study demonstrates that the momentum flux caused by mean velocities, i.e., u^- and v^-, is also responsible for the velocity deviation, and it is found that the streamwise velocity for a flow in the presence of non-zero wall-normal velocity does not follow the classical log-law, but the modified log-law proposed in this study based on simplified mixing-length theorem. The validity of the modified log-law has been verified by use of available experimental data from published sources for combined wave-current flows, and good agreement between the predicted and observed velocity profiles has been achieved.
文摘In this paper, an urban economic growth model with endogenous infrastructure allocation is given by introducing the two-variable utility function for city's inhabitant. A twodimensional dynamical system is obtained by solving the utility maximization problem and it is proved that this system has the unique non-zero equilibrium which is a saddle. The model has the unique optimal growth and an optimal rate of infrastructure allocation.
基金supported by the Bulgarian National Science Fund under Project DN 12/4 “Advanced analytical and numerical methods for nonlinear differential equations with applications in finance and environmental pollution”, 2017。
文摘The aim of this paper is to establish the existence of at least two non-zero homoclinic solutions for a nonlinear Laplacian difference equation without using AmbrosettiRabinowitz type-conditions. The main tools are mountain pass theorem and Palais-Smale compactness condition involving suitable functionals.
基金supported by National Key R&D Program of China(Nos.2019YFC0214800 and 2017YFC0212100)Beijing Municipal Science&Technology Commission(No.Z181100005418015)。
文摘In recent years,with rapid increases in the number of vehicles in China,the contribution of vehicle exhaust emissions to air pollution has become increasingly prominent.To achieve the precise control of emissions,on-road remote sensing(RS)technology has been developed and applied for law enforcement and supervision.However,data quality is still an existing issue affecting the development and application of RS.In this study,the RS data from a cross-road RS system used at a single site(from 2012 to 2015)were collected,the data screening process was reviewed,the issues with data quality were summarized,a new method of data screening and calibration was proposed,and the effectiveness of the improved data quality control methods was finally evaluated.The results showed that this method reduces the skewness and kurtosis of the data distribution by up to nearly 67%,which restores the actual characteristics of exhaust diffusion and is conducive to the identification of actual clean and high-emission vehicles.The annual variability of emission factors of nitric oxide decreases by 60%-on average-eliminating the annual drift of fleet emissions and improving data reliability.
文摘The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quantify as the diversity scheme is more efficient in enhancing the security of cellular multicast network mitigating the effects of correlation. Motivated by this issue, this paper considers a secure wireless multicasting scenario through correlated cellular networks in the presence of multiple eavesdroppers. The selection combining (SC) and switch and stay combining (SSC) techniques are considered in dual arbitrarily correlated Nakagami-m fading channels. The closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived to understand the insight into the effects of correlation on the SC and SSC diversity schemes and to quantify which diversity scheme is more efficient in enhancing the security of correlated multicast networks. The results show that, although the diversity gain reduces the effect of correlation, the diversity gain provided by the SC diversity scheme is more significant in mitigating the effect of correlation compared to the SSC diversity scheme. Due to the selection mechanism of SC diversity, it is more sensitive to the change of SNR of the eavesdropper’s channel compared to the case of the SSC diversity scheme.
文摘The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting.
文摘The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by these advantages of OSFBC-OFDM system, this paper considers a secure wireless multicasting scenario through multiple-input multiple-output (MIMO) OFDM system employing OSFBC over frequency selective α-μ fading channels. The authors are interested to protect the desired signals from eavesdropping considering the impact of the number of multicast users and eavesdroppers, and the fading parameters α and μ. A mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multi-casting (SOPM) to ensure the security in the presence of multiple eaves-droppers. The results show that the security in MIMO OSFBC OFDM system over α-μ fading is more sensitive to the magnitude of α and μ and this effect increases in the high signal-to-noise ratio (SNR) region of the main channel.
文摘The performance of Rayleigh fading channels is substantially impacted by the impacts of relays, antennas, and the number of branches. Opportunistic relaying is a potent technique for enhancing the effects of the aforementioned factors while enhancing the performance of fading channels. Due to these issues, a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is taken into consideration in this study. So the investigation of a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is the focus of this paper. The primary goals of this study are to maximize security in wireless multicasting while minimizing security loss caused by the effects of relays, branches at destinations and wiretappers, as well as multicast users and wiretappers through opportunistic relaying. To comprehend the insight effects of prior parameters, the closed form analytical expressions are constructed for the probability of non-zero secrecy multicast capacity (PNSMC), ergodic secrecy multicast capacity (ESMC), and secure outage probability for multicasting (SOPM). The findings demonstrate that opportunistic relaying is a successful method for reducing the loss of security in multicasting.