• No results found

[PDF] Top 20 A Space-Frequency Anti-Jamming Algorithm Based on Sub-Band Energy Detection

Has 10000 "A Space-Frequency Anti-Jamming Algorithm Based on Sub-Band Energy Detection" found on our website. Below are the top 20 most common "A Space-Frequency Anti-Jamming Algorithm Based on Sub-Band Energy Detection".

A Space-Frequency Anti-Jamming Algorithm Based on Sub-Band Energy Detection

A Space-Frequency Anti-Jamming Algorithm Based on Sub-Band Energy Detection

... major anti-jamming researches of global navigation satellite system (GNSS) mostly focus on receivers [2, ...the anti-jamming performance of ...on anti-interference algorithms are also ... See full document

10

A Large Scene Deceptive Jamming Method for Space-Borne SAR based on Time-Delay and Frequency-Shift with Template Segmentation

A Large Scene Deceptive Jamming Method for Space-Borne SAR based on Time-Delay and Frequency-Shift with Template Segmentation

... the jamming scene template, the jammer modulates and retransmits the intercepted radar pulse to generate jamming signal, which will form a false image after range and azimuth compression by the ...the ... See full document

22

Threshold Based Sub Band Fast Energy Detection of Cognitive Radio Spectrum

Threshold Based Sub Band Fast Energy Detection of Cognitive Radio Spectrum

... correspondence band of CR ...(FFT) based strategy appeared in figure 3, are utilized when the unearthly is dissected in the computerized ...predetermined band recurrence tested in time window is gone ... See full document

7

Validation of the Algorithm in the Detection of the Image of a Person Based on the Control of a Lighting Device

Validation of the Algorithm in the Detection of the Image of a Person Based on the Control of a Lighting Device

... the algorithm based on the detection of the person, consid- ering that it was developed in Matlab, using system capture image toolbox as the means of connection with video surveillance devices, which ... See full document

18

Jamming Attack Model And Detection Of Transmissions Using Cognitive Radio Network In Vehicular Network

Jamming Attack Model And Detection Of Transmissions Using Cognitive Radio Network In Vehicular Network

... This detection model is used with the help of cognitive radio mechanism, in which the problem that occurs when communication through high road density is higher due to high load on road, message communication get ... See full document

5

FRAUD DETECTION IN CARD NOT PRESENT TRANSACTIONS BASED ON BEHAVIORAL PATTERN

FRAUD DETECTION IN CARD NOT PRESENT TRANSACTIONS BASED ON BEHAVIORAL PATTERN

... Skin detection is the process of finding skin- color pixels and regions in an image or ...Skin detection is a very popular and useful technique for detecting and tracking human-body ...face detection ... See full document

6

A Study Combined DWT-DCT Digital Image
          Hiding Information

A Study Combined DWT-DCT Digital Image Hiding Information

... Hiding information is a technique used to hide data or identifying information within digital multimedia. Our discussion will focus primarily on the watermarking of digital images, though digital video, audio, and ... See full document

5

An Efficient Face Detection and Recognition System

An Efficient Face Detection and Recognition System

... The simplest classification scheme is a nearest neighbor classification in the image space .Under this scheme an image in the test set is recognized by assigning to it the label of the closest point in the ... See full document

5

Detection of Primary User in Cognitive Radio Using Bayesian Approach

Detection of Primary User in Cognitive Radio Using Bayesian Approach

... corresponding suboptimal structure in the low and high SNR regimes.It is well-known that the optimal detector for binary hypothesis testing based on Bayesian rule or Neyman-Pearson theorem is to compute the ... See full document

5

A Review on Frequency Hopping Spread Spectrum Based Anti Jamming Improvement With Encrypted Spreading Codes

A Review on Frequency Hopping Spread Spectrum Based Anti Jamming Improvement With Encrypted Spreading Codes

... and anti-jamming is very important for secure communication ...for anti-jamming improvement but my attention on Frequency hopping spread spectrum anti-jamming improvement ... See full document

6

Markov Model Based Jamming and Anti Jamming Performance Analysis for Cognitive Radio Networks

Markov Model Based Jamming and Anti Jamming Performance Analysis for Cognitive Radio Networks

... the jamming capability of the cognitive- radio-based jammers and the anti-jamming capability of the cognitive radio networks ...under jamming. With various jamming models, the ... See full document

10

Side-Lobe Jamming Based on Digital Channelization

Side-Lobe Jamming Based on Digital Channelization

... the energy distribution in a ...the energy concentrates. For periodic side-lobe jamming, presented in Figure 8(a), when N < M, JSR rises dramatically as N increases until it reaches its ...the ... See full document

10

Location-aware Cooperative Anti-jamming Distributed Channel Selection Approach in UAV Communication Networks

Location-aware Cooperative Anti-jamming Distributed Channel Selection Approach in UAV Communication Networks

... As is mentioned in Algorithm1, when users are influenced by co-channel interference, the proposed location-aware cooperative anti-jamming distributed channel selection algorithm (LCADCSA[r] ... See full document

15

External power supply operation 1250 memory channels* with 26 banks available

External power supply operation 1250 memory channels* with 26 banks available

... The frequency control ([R-DIAL]) function can be traded with volume control ([L-DIAL] and [ Y Y ]/[ Z Z ] keys) function by push- ing for 1 ...operating frequency) is used for simple ... See full document

108

Hybrid Iterative Multiuser Detection for Channel Coded Space Division Multiple Access OFDM Systems

Hybrid Iterative Multiuser Detection for Channel Coded Space Division Multiple Access OFDM Systems

... likelihood detection (MLD) [1], [2], [4], [5], [8] schemes may be invoked for the sake of separating the different users at the BS on a per-subcarrier ...ML detection arrangement was found to give the best ... See full document

13

A Novel Statistical Thresholding in Edge Detection Using Laplacian Pyramid and Directional Filter Banks

A Novel Statistical Thresholding in Edge Detection Using Laplacian Pyramid and Directional Filter Banks

... Initially, the flower image shown in Fig 4 is considered for experimentation. The proposed algorithm is tested by taking a ‘Meyer’ Laplacian Pyramidal wavelet and the ‘meyerh2’, ‘5/3’, ‘9/7’ directional filter ... See full document

5

An independently controlled energy storage to support short term frequency fluctuations in weak electrical grids

An independently controlled energy storage to support short term frequency fluctuations in weak electrical grids

... term frequency deviations in the context of wind farms and MGs is reported in ...response frequency support, [19] presents a Battery ES (BES) in a rule based control strategy to reduce power losses ... See full document

28

PSO GA Algorithm Based Cyberbullying Detection

PSO GA Algorithm Based Cyberbullying Detection

... cyberbullying detection and prevention. Hence cyberbullying detection and prevention is an emerging need in the social ...cyberbullying detection is performed based on cyber victimization and ... See full document

5

Skintone Detection Based on Steganography using Wavelet Transform

Skintone Detection Based on Steganography using Wavelet Transform

... Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication.It is the practice of concealing a file, message, image, or video within another file, message, ... See full document

12

Image Super Resolution Using Wavelet Analysis

Image Super Resolution Using Wavelet Analysis

... separate sub-bands. Then the above three higher frequency band images are interpolated by the utilization of bi-cubic ...higher frequency bands generated by stationary wavelet transform of the ... See full document

9

Show all 10000 documents...