Results 21 to 30 of about 16,976 (274)

An Intelligent Access Channel Algorithm Based on Distributed Double Q Learning

open access: yesApplied Sciences, 2022
Aiming at the problem of mutual interference between nodes and external malicious jamming in wireless communication networks, this paper proposes an intelligent communication anti-jamming algorithm based on distributed double Q-learning.
Guoliang Zhang   +3 more
doaj   +1 more source

Exploding iconography: The Mindbomb Project [PDF]

open access: yes, 2006
The Mindbomb project was started by a group of young artists, journalists and writers, rich in creative resources. Together they created the social poster.
Mercea, D.
core   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Research Prospect of Anti-Jamming Strategy for the Satellite Internet

open access: yes天地一体化信息网络, 2022
As an important infrastructure of the national information system, the satellite internet is of great signifi cance to the national security.Thus, it needs to ensure the validity and reliability of the data transmission in the hostile jamming environment.
Chen HAN, Aijun LIU, Kang AN
doaj   +2 more sources

An intelligent decision-making method for anti-jamming communication based on deep reinforcement learning

open access: yesXibei Gongye Daxue Xuebao, 2021
In order to solve the problem of intelligent anti-jamming decision-making in battlefield communication, this paper designs an intelligent decision-making method for communication anti-jamming based on deep reinforcement learning.

doaj   +1 more source

A Novel Anti-Jamming Decision-Making Algorithm Based on Knowledge Graph Technology

open access: yesApplied Sciences, 2022
Wireless communications are increasingly vulnerable to malicious jamming attacks due to the inherent openness and broadcast nature. In this regard, a novel anti-jamming scheme based on knowledge graph is proposed in this paper, where the knowledge graph ...
Yingtao Niu   +3 more
doaj   +1 more source

Anti-jamming performance of chaotic digital communication systems [PDF]

open access: yesIEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2002
Among the various modulation schemes proposed for chaos-based digital communications, chaos-shift keying (CSK) and differential chaos-shift keying (DCSK) have been most thoroughly analyzed and considered for practical implementation. One important aspect of performance of any communication system is the ability to resist jamming.
Lau, FCM, Ye, M, Tse, CKM, Hau, SSF
openaire   +2 more sources

Optimal Jammer Placement in Wireless Localization Systems [PDF]

open access: yes, 2016
In this study, the optimal jammer placement problem is proposed and analyzed for wireless localization systems. In particular, the optimal location of a jammer node is obtained by maximizing the minimum of the Cramer-Rao lower bounds (CRLBs) for a number
Bayram, Suat   +3 more
core   +2 more sources

Jamming-resilient algorithm for underwater cognitive acoustic networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Due to the limit spectrum resource in the underwater acoustic networks, underwater cognitive acoustic communication is a promising technique. The channel sharing mechanism in cognitive networks can improve the communication capacity efficiently.
Zixiang Wang   +4 more
doaj   +1 more source

A Novel Intelligent Anti-Jamming Algorithm Based on Deep Reinforcement Learning Assisted by Meta-Learning for Wireless Communication Systems

open access: yesApplied Sciences, 2023
In the field of intelligent anti-jamming, deep reinforcement learning algorithms are regarded as key technical means. However, the learning process of deep reinforcement learning algorithms requires a stable learning environment to ensure its ...
Qingchuan Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy