نتایج جستجو برای: based cooperative jamming
تعداد نتایج: 2985290 فیلتر نتایج به سال:
This paper studies the resource allocation problem when multiple jammers follow aircraft formation to support ground penetration. A joint optimization method of multi-jammer beam-power based on improved artificial bee colony (IABC) algorithm is proposed. The air-to-ground “many-to-many” assault cooperative suppression jamming model given. constant false alarm probability detection networked rad...
Signal evolution in social animals has produced a wide variety of communal displays, many of them remarkable feats of complex coordination. The two main explanations for this temporal precision are: (1) it evolves as a cooperative signal of coalition quality or (2) it minimizes signal jamming (i.e., interference of one signal by another). However, support for the first hypothesis is inconclusiv...
In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from source to destination assisted by cooperative devices. the first phase, space-time block code (STBC) is employed; thus, does not require any channel state (CSI). second devices are divided into two groups, depending on whether they serve for relaying or jamming. Based im...
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value NE . The channel matrices between the legitimate transmitters and the receiver are available everywhere, while the legi...
Robust Beamforming Design for SWIPT-Based Multi-Radio Wireless Mesh Network with Cooperative Jamming
We determine the exact sum secure degrees of freedom (d.o.f.) of the K -user Gaussian interference channel. We consider three different secrecy constraints: 1) K -user interference channel with one external eavesdropper (IC-EE); 2) K -user interference channel with confidential messages (IC-CM); and 3) K -user interference channel with confidential messages and one external eavesdropper (IC-CM-...
This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, secondary source continuously generates encoded packets, and sends them to destination relay nodes that attempt receive sufficient number the pa
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید