نتایج جستجو برای: mobile jammers
تعداد نتایج: 171927 فیلتر نتایج به سال:
mobile robot navigation is one of the basic problems in robotics. in this paper, a new approachis proposed for autonomous mobile robot navigation in an unknown environment. the proposedapproach is based on learning virtual parallel paths that propel the mobile robot toward the trackusing a multi-layer, feed-forward neural network. for training, a human operator navigates themobile robot in some...
background: mobile health is one of the new technologies for the utilization of health information. for its successful implementation as well as any other system, we must primarily measure the adoption and use of its factors. the purpose of this study was to systematically investigate published articles about the factors affecting the adoption of mobile health and categorizing the factors affec...
grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. mobile computing is a generic word that introduces using of movable, handheld devices with wireless communication, for processing data. mobile computing focused on providing access to data, information, services and communications anywhere an...
Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels overwhelming network with jamming packets, especially for self-driving cars, as it essential to send/receive messages without any interruptions control vehicles remotely. In wireless ad hoc networks (VANET), attacker’s mission more accessible due network’s open nature, w...
This paper develops a novel framework to defeat super-reactive jammer, one of the most difficult jamming attacks deal with in practice. Specifically, jammer has an unlimited power budget and is equipped self-interference suppression capability simultaneously attack listen transmitter’s activities. Consequently, dealing jammers very challenging. Thus, we introduce smart deception mechanism attra...
This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network mode...
background: mobile phone has become extremely popular and widely used all over the world. now a day, consumers around the world can purchase a single product that utility as a mobile phone, camera, camcorder, calculator, game console, text-messaging device, mp3 player, alarm clock, web browser and email device. the purpose of the present study was to explore self-reported use of various feature...
This paper presents experimental analysis of wheeled mobile robots. Mathematical modelling of the mobile robot is presented. The mobile robots consist of an omni-directional and three differential drive mobile robots are tested and moved in given trajectories and the systematic errors of the robots are determined. A new method for omni-direction mobile robot was introduced in which the robot wa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید