نتایج جستجو برای: spectrum sensing data falsification attack
تعداد نتایج: 2736404 فیلتر نتایج به سال:
In recent decades, rapid growth in wireless communication service makes the limited spectrum resources become increasingly scarce. Cognitive radio [1] can solve this problem by dynamic spectrum access technology. Spectrum sensing is one of the key technology of cognitive radios and the quick and accurate perception of broadband spectrum hole is the main challenge. In order to improve the effici...
To the editor: Re: Poehlman ET, Goran MJ, Gardner AW, Ades PA, Arcerio PJ, Katzman-Rooks SN, Montgomery SM, Toth MJ, and Sutherland PT. Determinants of decline in resting metabolic rate in aging females. Am J Physiol Endocrinol Metab 264: E450–E455, 1993. In the referenced paper, we reported cross-sectional changes in a number of physiological and metabolic markers in a cohort of 183 women aged...
Cognitive radio (CR) is a key solution for the problem of inefficient usage of spectral resources. Spectrum sensing in each CR aims at detecting whether a preassigned spectrum band is occupied by a primary user or not. Conventional techniques do not allow the CR to communicate with its own base station during the spectrum sensing process. So, only a part of the frame can be used for cognitive d...
In distributed detection systems, energy-efficient ordered transmission (EEOT) schemes are able to reduce the number of transmissions required make a final decision. this work, we investigate effect data falsification attacks on performance EEOT-based systems. We derive probability error for an system under attack and find upper bound (UB) expected Moreover, tighten UB by solving optimization p...
Spectrum sensing is a critical functionality of Cognitive Radio(CR) systems. There are number of spectrum sensing techniques. One of techniques is energy detection. Energy detection is the simplest detection method and is the most commonly used. But, energy detection has a hidden terminal problem in real wireless communication, because of SU can be affected by frequency fading and shadowing. Co...
This paper proposes a censored and ordered sequential collaborative spectrum sensing scheme for cognitive radio ad hoc network (CRAHN). The scheme uses the ordered of the sensing data reliability for enabling the Dempster Shafer theory of evidence sequential combination. A preceding censored process removes the nodes having insignificant sensing data to the broadcasting sensing result process. ...
Remote sensing data and information are shown great potential in supplying relevant spatial data and parameters at the appropriate scale for use in distributed hydrological models for water resource applications. In contrast with many conventional data normally represented by point measurements, remote sensing based measurements are spatially averages over the pixels can appropriate for distrib...
The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because users (PU) and secondary (SU) are unable to communicate if a malicious (MU) present. In literature, some techniques used detect attack. However, those do not explore cooperative detection PUE using deep neural (DNN) MCRN network with experimental results on software-defined ...
background: this study was done to determine the prevalence of publication misconduct among iranian authors. methods: data were collected through an email survey of corresponding authors of papers published in iranian journals indexed in scopus during 2009-2011. using the double list experiment, these individuals were indirectly questioned about committing one of the five misconducts including ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید