The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
<p>The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i></p>
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Published: |
2025
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1852022454092824576 |
|---|---|
| author | Dinh Van Linh (20783861) |
| author2 | Vu Van Yem (20783864) Hoang Thi Phuong Thao (20783867) |
| author2_role | author author |
| author_facet | Dinh Van Linh (20783861) Vu Van Yem (20783864) Hoang Thi Phuong Thao (20783867) |
| author_role | author |
| dc.creator.none.fl_str_mv | Dinh Van Linh (20783861) Vu Van Yem (20783864) Hoang Thi Phuong Thao (20783867) |
| dc.date.none.fl_str_mv | 2025-02-25T18:55:58Z |
| dc.identifier.none.fl_str_mv | 10.1371/journal.pone.0318110.g008 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/figure/The_BER_of_the_systems_with_conventional_polar_code_and_the_proposed_secure_polar_code_in_case_of_i_R_i_1_4_and_modified_i_N_i_/28489031 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Sociology Space Science Biological Sciences not elsewhere classified Chemical Sciences not elsewhere classified Information Systems not elsewhere classified passive eavesdropping attacks existing methods despite allowing data encryption traditional polar codes bit error rate wireless channel characteristics taking one step secret key generated different key lengths coding technique based secret key channel coding reliability characteristics polar code error correction code lengths key management key benefit coding technique xlink "> work proposes two parts information bits helps us frozen bits computational complexity |
| dc.title.none.fl_str_mv | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> |
| dc.type.none.fl_str_mv | Image Figure info:eu-repo/semantics/publishedVersion image |
| description | <p>The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i></p> |
| eu_rights_str_mv | openAccess |
| id | Manara_e73e23091d4a421a2a730bfef6d407bf |
| identifier_str_mv | 10.1371/journal.pone.0318110.g008 |
| network_acronym_str | Manara |
| network_name_str | ManaraRepo |
| oai_identifier_str | oai:figshare.com:article/28489031 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>Dinh Van Linh (20783861)Vu Van Yem (20783864)Hoang Thi Phuong Thao (20783867)SociologySpace ScienceBiological Sciences not elsewhere classifiedChemical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedpassive eavesdropping attacksexisting methods despiteallowing data encryptiontraditional polar codesbit error ratewireless channel characteristicstaking one stepsecret key generateddifferent key lengthscoding technique basedsecret keychannel codingreliability characteristicspolar codeerror correctioncode lengthskey managementkey benefitcoding techniquexlink ">work proposestwo partsinformation bitshelps usfrozen bitscomputational complexity<p>The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i></p>2025-02-25T18:55:58ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0318110.g008https://figshare.com/articles/figure/The_BER_of_the_systems_with_conventional_polar_code_and_the_proposed_secure_polar_code_in_case_of_i_R_i_1_4_and_modified_i_N_i_/28489031CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/284890312025-02-25T18:55:58Z |
| spellingShingle | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> Dinh Van Linh (20783861) Sociology Space Science Biological Sciences not elsewhere classified Chemical Sciences not elsewhere classified Information Systems not elsewhere classified passive eavesdropping attacks existing methods despite allowing data encryption traditional polar codes bit error rate wireless channel characteristics taking one step secret key generated different key lengths coding technique based secret key channel coding reliability characteristics polar code error correction code lengths key management key benefit coding technique xlink "> work proposes two parts information bits helps us frozen bits computational complexity |
| status_str | publishedVersion |
| title | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> |
| title_full | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> |
| title_fullStr | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> |
| title_full_unstemmed | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> |
| title_short | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> |
| title_sort | The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i> |
| topic | Sociology Space Science Biological Sciences not elsewhere classified Chemical Sciences not elsewhere classified Information Systems not elsewhere classified passive eavesdropping attacks existing methods despite allowing data encryption traditional polar codes bit error rate wireless channel characteristics taking one step secret key generated different key lengths coding technique based secret key channel coding reliability characteristics polar code error correction code lengths key management key benefit coding technique xlink "> work proposes two parts information bits helps us frozen bits computational complexity |