The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>

<p>The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i></p>

Saved in:
Bibliographic Details
Main Author: Dinh Van Linh (20783861) (author)
Other Authors: Vu Van Yem (20783864) (author), Hoang Thi Phuong Thao (20783867) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1852022454092824576
author Dinh Van Linh (20783861)
author2 Vu Van Yem (20783864)
Hoang Thi Phuong Thao (20783867)
author2_role author
author
author_facet Dinh Van Linh (20783861)
Vu Van Yem (20783864)
Hoang Thi Phuong Thao (20783867)
author_role author
dc.creator.none.fl_str_mv Dinh Van Linh (20783861)
Vu Van Yem (20783864)
Hoang Thi Phuong Thao (20783867)
dc.date.none.fl_str_mv 2025-02-25T18:55:58Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0318110.g008
dc.relation.none.fl_str_mv https://figshare.com/articles/figure/The_BER_of_the_systems_with_conventional_polar_code_and_the_proposed_secure_polar_code_in_case_of_i_R_i_1_4_and_modified_i_N_i_/28489031
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Sociology
Space Science
Biological Sciences not elsewhere classified
Chemical Sciences not elsewhere classified
Information Systems not elsewhere classified
passive eavesdropping attacks
existing methods despite
allowing data encryption
traditional polar codes
bit error rate
wireless channel characteristics
taking one step
secret key generated
different key lengths
coding technique based
secret key
channel coding
reliability characteristics
polar code
error correction
code lengths
key management
key benefit
coding technique
xlink ">
work proposes
two parts
information bits
helps us
frozen bits
computational complexity
dc.title.none.fl_str_mv The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
dc.type.none.fl_str_mv Image
Figure
info:eu-repo/semantics/publishedVersion
image
description <p>The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i></p>
eu_rights_str_mv openAccess
id Manara_e73e23091d4a421a2a730bfef6d407bf
identifier_str_mv 10.1371/journal.pone.0318110.g008
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/28489031
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>Dinh Van Linh (20783861)Vu Van Yem (20783864)Hoang Thi Phuong Thao (20783867)SociologySpace ScienceBiological Sciences not elsewhere classifiedChemical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedpassive eavesdropping attacksexisting methods despiteallowing data encryptiontraditional polar codesbit error ratewireless channel characteristicstaking one stepsecret key generateddifferent key lengthscoding technique basedsecret keychannel codingreliability characteristicspolar codeerror correctioncode lengthskey managementkey benefitcoding techniquexlink ">work proposestwo partsinformation bitshelps usfrozen bitscomputational complexity<p>The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i></p>2025-02-25T18:55:58ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0318110.g008https://figshare.com/articles/figure/The_BER_of_the_systems_with_conventional_polar_code_and_the_proposed_secure_polar_code_in_case_of_i_R_i_1_4_and_modified_i_N_i_/28489031CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/284890312025-02-25T18:55:58Z
spellingShingle The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
Dinh Van Linh (20783861)
Sociology
Space Science
Biological Sciences not elsewhere classified
Chemical Sciences not elsewhere classified
Information Systems not elsewhere classified
passive eavesdropping attacks
existing methods despite
allowing data encryption
traditional polar codes
bit error rate
wireless channel characteristics
taking one step
secret key generated
different key lengths
coding technique based
secret key
channel coding
reliability characteristics
polar code
error correction
code lengths
key management
key benefit
coding technique
xlink ">
work proposes
two parts
information bits
helps us
frozen bits
computational complexity
status_str publishedVersion
title The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
title_full The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
title_fullStr The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
title_full_unstemmed The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
title_short The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
title_sort The BER of the systems with conventional polar code and the proposed secure polar code in case of <i>R</i> = 1 ∕ 4 and modified <i>N.</i>
topic Sociology
Space Science
Biological Sciences not elsewhere classified
Chemical Sciences not elsewhere classified
Information Systems not elsewhere classified
passive eavesdropping attacks
existing methods despite
allowing data encryption
traditional polar codes
bit error rate
wireless channel characteristics
taking one step
secret key generated
different key lengths
coding technique based
secret key
channel coding
reliability characteristics
polar code
error correction
code lengths
key management
key benefit
coding technique
xlink ">
work proposes
two parts
information bits
helps us
frozen bits
computational complexity