CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 编程文档 搜索资源 - primary user

搜索资源列表

  1. 1569490789

    0下载:
  2. 最新认知无线电安全领域的文章,关于PUEA,即是主用户仿真攻击方面的文章,采用MME算法和合作用户选择算法。-the newest article about security in cognitive radio networks, that is Primary User Emulation Attack,short for PUEA. In the article, the MME detection method and the spatial-correlation based
  3. 所属分类:Communication

    • 发布日期:2017-04-16
    • 文件大小:264189
    • 提供者:liufayu
  1. CR-source-code.bin

    0下载:
  2. CR Code by Mat-lab (Relation between primary and second user)
  3. 所属分类:Communication

    • 发布日期:2017-12-01
    • 文件大小:1171
    • 提供者:mnagieb
  1. Matlab-code-for-Received-power-by-secondary-User-

    0下载:
  2. Matlab code for Received power by secondary User due to primary user in cognitive radio
  3. 所属分类:Communication

    • 发布日期:2017-03-29
    • 文件大小:10264
    • 提供者:Akhil Choudhary
  1. Analysis-of-Primary-User-Emulation-Attack-with-Mo

    0下载:
  2. study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user and secondary users are fixed
  3. 所属分类:Communication

    • 发布日期:2017-04-04
    • 文件大小:336311
    • 提供者:walid
  1. Defense-Against-Primary-User-Emulation-Attacks-in

    0下载:
  2. This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band
  3. 所属分类:Communication

    • 发布日期:2017-05-04
    • 文件大小:1161366
    • 提供者:walid
  1. Detecting-Primary-User-Emulation-Attacks-in-Cogni

    0下载:
  2. Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulato
  3. 所属分类:Communication

    • 发布日期:2017-05-11
    • 文件大小:2169384
    • 提供者:walid
  1. Teguig13a

    0下载:
  2. The combining rules considered in this study are the OR hard combining rule, AND the hard combining rule, the Equal Gain Soft combining rule and the two-bit quantized (softened hard) combining rule. For all combining rules, the detection performance,
  3. 所属分类:Communication

    • 发布日期:2017-05-04
    • 文件大小:385598
    • 提供者:suchita
  1. 1-s2.0-S131915781500097X-main

    0下载:
  2. In this paper we uate the performance of cooperative spectrum sensing (CSS) where each cognitive radio (CR) employs an improved energy detector (IED) with multiple antennas and uses selection combining (SC) for detecting the primary user (PU) in
  3. 所属分类:Communication

    • 发布日期:2017-05-06
    • 文件大小:721358
    • 提供者:suchita
搜珍网 www.dssz.com