نتایج جستجو برای: mobile jammers
تعداد نتایج: 171927 فیلتر نتایج به سال:
Analysis of Behavioral Characteristics of Jammers to Detect Malicious Nodes in Mobile ADHOC Networks
Wireless ADHOC Networks are used to establish a wireless connection between two computing devices without the need for Wi-Fi access point or router. This network is decentralized and uses omnidirectional communication media, which makes it more vulnerable certain types of attacks compared wired networks. Jamming attacks, subset denial-of-service (DoS) involve malicious nodes that intentionally ...
Breast cancer is the most common malignancy among women, both in the developed and developing countries. Women with mutations in the BRCA1 and BRCA2 genes have an increased risk of breast and ovarian cancers. Recent studies show that short-wavelength visible light disturb the secretion of melatonin and causes circadian rhythm disruption. We have previously studied the health effects of exposure...
Background: Although it is one of the most toxic nonradioactive elements, mercury is widely used in dental amalgam. Mercury is a toxic element which can damage various organs such as central nervous system, renal, respiratory and hematologic systems. The adverse health impacts associated to exposure to some common sources of electromagnetic fields including laptop computers, mobile phones, ...
As a tendency to use new technologies, gadgets such as laptop computers are becoming more popular among students, teachers, businessmen and office workers. Today laptops are a great tool for education and learning, work and personal multimedia. Millions of men, especially those in the reproductive age, are frequently using their laptop computers on the lap (thigh). Over the past several years, ...
introduction : the fast-growing telecommunication and wireless technologies has led to more dependence to these communication devices and higher levels of exposure to electromagnetic radiations propagated by cellular devices and their service towers. to disable signaling in places where silence is valued or where information quarantine measures are required, mobile phone jammers emit radiofrequ...
background: although it is one of the most toxic nonradioactive elements, mercury is widely used in dental amalgam. mercury is a toxic element which can damage various organs such as central nervous system, renal, respiratory and hematologic systems. the adverse health impacts associated to exposure to some common sources of electromagnetic fields including laptop computers, mobile phones, mri ...
800x600 as a tendency to use new technologies, gadgets such as laptop computers are becoming more popular among students, teachers, businessmen and office workers. today laptops are a great tool for education and learning, work and personal multimedia. millions of men, especially those in the reproductive age, are frequently using their laptop computers on the lap (thigh). over the past several...
When wideband and narrowband interferences in a GPS system are stationary, a large number of data samples may be obtained to get a good estimate of the interference. However, the jamming environment may be one in which the narrowband jammers have the ability to change frequencies dynamically or the rapid dynamics of the aircraft during maneuvering causes arrival angles of wideband jammers to ch...
The problem of jamming plays a very important role in ensuring the quality and security of wireless communications, especially now when wireless networks are quickly becoming ubiquitous. Since jamming phenomenon can be considered as a game where a player (say, jammer) is playing against a user (transmitter), game theory is an appropriate tool for dealing with the jamming problem. In this paper ...
We consider the problem of identifying the insider-based attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. While this type of attackers is dangerous, most of current state-of-the-art jamming detection solutions cannot cope with them. In this work, we propose a n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید