نتایج جستجو برای: based cooperative jamming
تعداد نتایج: 2985290 فیلتر نتایج به سال:
Taking the move from our recent research on GNSS Avionics Based Integrity Augmentation (ABIA), this article investigates the synergies of ABIA with a novel Detect-and-Avoid (DAA) architecture for Remotely Piloted Aircraft System (RPAS). Based on simulation and experimental data collected on a variety of manned and unmanned aircraft, it was observed that the integration of ABIA with DAA has the ...
We study, in the fluid flow framework, the cooperative dynamics of a buffered production line in which the production rate of each work-cell does depend on the content of its adjacent buffers. Such state dependent fluid queueing networks are typical for people based manufacturing systems where human operators adapt their working rates to the observed environment. We unveil a close analogy betwe...
Jamming has long been a problem in wireless communications. Recently, adaptive jamming and anti-jamming techniques have been proposed which aim to use feedback to better perform their task. For an anti-jamming receiver this means detecting jamming and adapting its protocol appropriately. For a jammer this means using feedback from the legitimate system to design a high-impact, low-power, hard-t...
A new defense mechanism for different jamming attack on Wireless Sensor Network (WSN) based on ant system it is introduced. The artificial sensitive ants react on network attacks in particular based on their sensitivity level. The information is re-directed from the attacked node to its appropriate destination node. It is analyzed how are detected and isolated the jamming attacks with mobile ag...
In this article, we investigated the secrecy performance of a three-hop relay network system with Power Splitting (PS) and Energy Harvesting (EH). presence one eavesdropper, signal is transferred from source to destination help relay. The transmits in full-duplex (FD) mood, jamming transfer signals destination. employ Time Switching (TS) (EH) techniques obtain power beacon. study, compared Secr...
Unlock outlook of the connection without any type of wire based medium will puts down the intentional intervention assault, usually submitted to like jamming. These type of the intentional intervention with the transmission without wire commence the pad for the purpose of growing refutation of the provide Services based assault onto the network that is not connected with the wire. Usually, jamm...
The rheology near jamming of a suspension of soft colloidal spheres is studied using a custom microfluidic rheometer that provides the stress versus strain rate over many decades. We find non-Newtonian behavior below the jamming concentration and yield-stress behavior above it. The data may be collapsed onto two branches with critical scaling exponents that agree with expectations based on Hert...
Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, l...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید