نتایج جستجو برای: based cooperative jamming
تعداد نتایج: 2985290 فیلتر نتایج به سال:
Cooperative Adaptive Cruise Control (CACC) is considered as a key enabling technology to automatically regulate the intervehicle distances in a vehicle platoon to improve traffic efficiency while maintaining safety. Although the wireless communication and physical processes in the existing CACC systems are integrated in one control framework, the coupling between wireless communication reliabil...
MAC layer jamming is a common attack on wireless networks, which is easy to launch by the attacker and which is very effective in disrupting the service provided by the network. Most of the current MAC protocols for wireless networks, for example, IEEE 802.11, do not provide sufficient protection against MAC layer jamming attacks. In this paper, we first use a non-cooperative game model to char...
This paper presents design and implementation of three new Infrared Counter-Countermeasure (IRCCM) efficient methods using Neural Network (NN), Fuzzy System (FS), and Kalman Filter (KF). The proposed algorithms estimate tracking error or correction signal when jamming occurs. An experimental test setup is designed and implemented for performance evaluation of the proposed methods. The methods v...
Intelligence reconfigurable surfaces (IRS) have attracted attention due to their ability create an intelligent and controllable wireless propagation environment for supporting efficient, secure design. Security privacy protection are fundamental requirements based on the eavesdropping attacks in networks. Physical layer security (PLS) is important technique that guarantees information-theoretic...
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdropping clus...
We consider secure communication over a two-user Gaussian interference channel, where each transmitter sends a confidential message to its legitimate receiver. For this setting, we identify a regime where the simple scheme of using Gaussian wiretap codebook at each transmitter (without cooperative jamming) and treating interference as noise at each intended receiver (in short, GWC-TIN scheme) a...
abstract cooperative learning refers to small groups of learners working together as a team to solve a problem, complete a task, or accomplish a common goal. in a cooperative environment one’s success is directly related to the success of other members because the focus on the individual shifts towards the group. to test the effectiveness of the method, using jigsaw technique, a study was cond...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید