نتایج جستجو برای: mobile jammers
تعداد نتایج: 171927 فیلتر نتایج به سال:
0
Optimum Power Allocation for Average Power Constrained Jammers in the Presence of Non-Gaussian Noise
The adaptive matched lter (AMF) detector is known to be highly vulnerable to jammers and clutter discretes on which it has not properly trained. A vulnerability often leading to impractical false alarm rates in non-homogeneous environments. Sequentially following the AMF test with the adaptive cosine estimator (ACE) detector was proposed as a method of regulating the AMF's high false alarm rate...
© 2014 Xiangyu Li et al. 183 http://dx.doi.org/10.4218/etrij.14.0213.0090 In this letter, we consider a cooperation system with multiple untrusted relays (URs). To keep the transmitted information confidential, we obtain joint channel characteristics (JCCs) through combining the channels from the source to the destination. Then, in the null space of the JCCs, jammers construct artificial noise ...
Cognitive jammers are able to deploy advanced strategies that degrade the performance of cognitive radio user communications. In this paper, we study the problem of power allocation in cognitive radio user and jammer games, over parallel Gaussian channels. We model the interaction between a communicator (a transmitter-receiver pair) and a jammer using zero-sum games with continuous action sets;...
In this paper, we compare low cost implementations of wideband adaptive beamformers utilising the generalised sidelobe canceller (GSC) in combination with the least-mean squares algorithms. DFT based techniques suffer from unjustified narrowband assumptions. We therefore derive and investigate an overlap-save implementation of the GSC, which offers a steady state suppression of jammers equivale...
In this paper, we propose a strategy to avoid or mitigate reactive forms of jamming using a reinforcement learning approach. The mitigation strategy focuses on finding an effective channel hopping and idling pattern to maximize link throughput. Thus, the strategy is well-suited for frequency-hopping spread spectrum systems, and best performs in tandem with a channel selection algorithm. By usin...
In this article, the anti-jamming communication problem is investigated from a game-theoretic learning perspective. By exploring and analyzing intelligent communication, we present characteristics of jammers requirements an approach. Such approach required self-sensing, self-decision making, self-coordination, self-evaluation, ability. Then (GTLAJ) paradigm proposed, its framework challenges ar...
The Internet of Things (IoT) immensely benefits from wireless sensor networks (WSNs). Unfortunately, WSNs, by virtue being low-power, are vulnerable to physical jamming attacks. This letter focuses on WSNs with multiple gateways where potentially many sensors under the attack a smart jammer. jammer can observe communication links and selectively jam transmission some such that throughput WSN is...
mobile technology and mobile learning are considered as important and impressive factors in earning the organizational competencies and achieving competitive advantages and customer loyalty. the purpose of this study is to evaluate the role of mobile technology in customer loyalty. the mellat bank mobile services are entering a new transition period. in response, the banking industrial is shift...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید