نتایج جستجو برای: based cooperative jamming

تعداد نتایج: 2985290  

Journal: :IEEE Transactions on Vehicular Technology 2018

Journal: :Journal of Physics: Conference Series 2021

Journal: :Mathematics 2023

This paper studies the resource allocation problem when multiple jammers follow aircraft formation to support ground penetration. A joint optimization method of multi-jammer beam-power based on improved artificial bee colony (IABC) algorithm is proposed. The air-to-ground “many-to-many” assault cooperative suppression jamming model given. constant false alarm probability detection networked rad...

Journal: :Current Biology 2009
Joseph A. Tobias Nathalie Seddon

Signal evolution in social animals has produced a wide variety of communal displays, many of them remarkable feats of complex coordination. The two main explanations for this temporal precision are: (1) it evolves as a cooperative signal of coalition quality or (2) it minimizes signal jamming (i.e., interference of one signal by another). However, support for the first hypothesis is inconclusiv...

Journal: :IEEE Access 2023

In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from source to destination assisted by cooperative devices. the first phase, space-time block code (STBC) is employed; thus, does not require any channel state (CSI). second devices are divided into two groups, depending on whether they serve for relaying or jamming. Based im...

2014
Mohamed Amir Tamer Khattab Tarek Elfouly Amr Mohamed

We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value NE . The channel matrices between the legitimate transmitters and the receiver are available everywhere, while the legi...

Journal: :IEEE Trans. Information Theory 2015
Jianwei Xie Sennur Ulukus

We determine the exact sum secure degrees of freedom (d.o.f.) of the K -user Gaussian interference channel. We consider three different secrecy constraints: 1) K -user interference channel with one external eavesdropper (IC-EE); 2) K -user interference channel with confidential messages (IC-CM); and 3) K -user interference channel with confidential messages and one external eavesdropper (IC-CM-...

Journal: :EAI endorsed transactions on industrial networks and intelligent systems 2021

This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, secondary source continuously generates encoded packets, and sends them to destination relay nodes that attempt receive sufficient number the pa

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید