咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 11 篇 计算机科学与技术...
    • 10 篇 材料科学与工程(可...
    • 10 篇 电子科学与技术(可...
    • 6 篇 机械工程
    • 6 篇 仪器科学与技术
    • 6 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 力学(可授工学、理...
    • 3 篇 化学工程与技术
    • 2 篇 建筑学
    • 2 篇 软件工程
    • 1 篇 冶金工程
    • 1 篇 土木工程
    • 1 篇 水利工程
    • 1 篇 地质资源与地质工...
    • 1 篇 城乡规划学
    • 1 篇 生物工程
  • 19 篇 理学
    • 9 篇 物理学
    • 6 篇 化学
    • 4 篇 天文学
    • 2 篇 数学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 地质学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 4 篇 医学
    • 4 篇 临床医学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 军事学

主题

  • 43 篇 jamming
  • 3 篇 reinforcement le...
  • 3 篇 simulation
  • 3 篇 noise
  • 3 篇 relay
  • 3 篇 attack
  • 3 篇 security
  • 2 篇 spoofing
  • 2 篇 throughput
  • 2 篇 communication
  • 2 篇 phase
  • 2 篇 unmanned aerial ...
  • 2 篇 artificial
  • 2 篇 unmanned aerial ...
  • 2 篇 radar detection
  • 2 篇 detection
  • 2 篇 shear
  • 2 篇 of
  • 2 篇 frequency
  • 2 篇 force network

机构

  • 2 篇 department of in...
  • 2 篇 department of ma...
  • 1 篇 school of electr...
  • 1 篇 中国科学院软物质...
  • 1 篇 faculty of engin...
  • 1 篇 institute for tu...
  • 1 篇 department of el...
  • 1 篇 national key lab...
  • 1 篇 department of ph...
  • 1 篇 department of el...
  • 1 篇 beijing advanced...
  • 1 篇 college of pipel...
  • 1 篇 telecom paristec...
  • 1 篇 the engineering ...
  • 1 篇 departmentofelec...
  • 1 篇 1school of elect...
  • 1 篇 simulation & int...
  • 1 篇 school of comput...
  • 1 篇 institute of the...
  • 1 篇 aeronautics engi...

作者

  • 6 篇 徐宁
  • 3 篇 liang xiao
  • 3 篇 arif sari
  • 2 篇 xiaozhen lu
  • 2 篇 童华
  • 2 篇 yi zhang
  • 2 篇 刘浩
  • 1 篇 zhenzhen song
  • 1 篇 du haiwen
  • 1 篇 zhi xue
  • 1 篇 shenbo li
  • 1 篇 omid sharifi-teh...
  • 1 篇 ning xu
  • 1 篇 sharmila vadivel
  • 1 篇 童真
  • 1 篇 xin zhao
  • 1 篇 li zhongyun
  • 1 篇 yilmaz ozcelik
  • 1 篇 ming yi
  • 1 篇 jürgen schmitt

语言

  • 38 篇 英文
  • 5 篇 中文
检索条件"主题词=Jamming"
43 条 记 录,以下是1-10 订阅
排序:
K-core attack, equilibrium K-core,and kinetically constrained spin system
收藏 引用
Chinese Physics B 2024年 第6期33卷 14-26页
作者: 周海军 Institute of Theoretical Physics Chinese Academy of SciencesBeijing 100190China MinJiang Collaborative Center for Theoretical Physics MinJiang UniversityFuzhou 350108China School of Physical Sciences University of Chinese Academy of SciencesBeijing 100049China
Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 234-246页
作者: Xiaozhen LU Jingfang JIE Zihan LIN Liang XIAO Jin LI Yanyong ZHANG Department of Information and Communication Engineering Xiamen University School of Computer Science and Technology University of Science and Technology of China School of Computer Science and Educational Software Guangzhou University
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhau... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Towards reinforcement learning in UAV relay for anti-jamming maritime communications
收藏 引用
Digital Communications and Networks 2023年 第6期9卷 1477-1485页
作者: Chuhuan Liu Yi Zhang Guohang Niu Luliang Jia Liang Xiao Jiangxia Luan Department of Information and Communication Engineering Xiamen UniversityXiamen361005China School of Space Information Space Engineering UniversityBeijing101400China Xiamen Meiya Pico Information Co. Ltd.Xiamen361005China
Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
VANET jamming and Adversarial Attack Defense for Autonomous Vehicle Safety
收藏 引用
Computers, Materials & Continua 2022年 第5期71卷 3589-3605页
作者: Haeri Kim Jong-Moon Chung Department of Vehicle Convergence Engineering Yonsei UniversitySeoul03722Korea School of Electrical&Electronic Engineering Yonsei UniversitySeoul03722Korea
The development of Vehicular Ad-hoc Network(VANET)technology is helping Intelligent Transportation System(ITS)services to become a reality.Vehicles can use VANETs to communicate safety messages on the road(while drivi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
jamming of packings of frictionless particles with and without shear
收藏 引用
Chinese Physics B 2018年 第6期27卷 315-319页
作者: 郑文 张世允 徐宁 Hefei National Laboratory for Physical Sciences at the Microscale Key Laboratory of Soft Matter Chemistry of Chinese Academy of Sciencesand Department of Physics University of Science and Technology of China
By minimizing the enthalpy of packings of frictionless particles, we obtain jammed solids at desired pressures and hence investigate the jamming transition with and without shear. Typical scaling relations of the jamm... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anti-follower jamming wide gap multi-pattern frequency hopping communication method
收藏 引用
Defence Technology(防务技术) 2020年 第2期16卷 453-459页
作者: Yao-bei Wang Hou-de Quan Hui-xian Sun Pei-zhang Cui Department of Electronic and Optical Engineering Army Engineering UniversityShijiazhuang 050003China National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of ChinaChengdu 611731China
This paper deals with the follower jamming(FJ)resistance for the frequency hopping(FH)communication system over additive white Gaussian noise(AWGN)channel.Conventional FH systems are susceptible to be jammed by FJ,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A jamming method against bistatic SAR based on modulation theory
收藏 引用
Journal of Systems Engineering and Electronics 2019年 第3期30卷 504-510页
作者: RAN Jinhe LI Xiuhe SHEN Yang Electronic Countermeasure Institute National University of Defense Technology
This paper focuses on the jamming problem of bistatic synthetic aperture radar (BiSAR), and a jamming method against BiSAR based on modulation theory is proposed. The proposed jamming method modulates the BiSAR signal... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Prediction of TBM jamming risk in squeezing grounds using Bayesian and artificial neural networks
收藏 引用
Journal of Rock Mechanics and Geotechnical Engineering 2020年 第1期12卷 21-31页
作者: Rohola Hasanpour Jamal Rostami Jürgen Schmitt Yilmaz Ozcelik Babak Sohrabian Institute for Tunneling and Construction Management Ruhr-University BochumBochumGermany Department of Mining Engineering Colorado School of MinesGoldenUSA Department of Civil Engineering Darmstadt University of Applied ScienceDarmstadtGermany Department of Mining Engineering Hacettepe UniversityAnkaraTurkey Faculty of Mining and Metallurgical Engineering Urmia University of TechnologyUrmiaIran
This study presents an application of artificial neural network(ANN)and Bayesian network(BN)for evaluation of jamming risk of the shielded tunnel boring machines(TBMs)in adverse ground conditions such as squeezing gro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Impact of Tactical Parameters of Aircraft on jamming Effectiveness of Surface-Source IR Decoy
收藏 引用
Computer Modeling in Engineering & Sciences 2019年 第2期118卷 425-446页
作者: Shenbo Li Qi Tong Chaozhe Wang Aeronautics Engineering Institute Air Force Engineering UniversityXi’an710038China.
As the platform for surface-source infrared decoys,the target aircraft is the aim of attacks in air-to-air combat.It can quickly and accurately evaluate the jamming effectiveness of the surface-source IR decoy in vari... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Distributed reinforcement learning based framework for energy-efficient UAV relay against jamming
收藏 引用
Intelligent and Converged Networks 2021年 第2期2卷 150-162页
作者: Weihang Wang Zefang Lv Xiaozhen Lu Yi Zhang Liang Xiao Department of Information and Communication Engineering Xiamen UniversityXiamen 361005China Beijing Key Laboratory of Mobile Computing and Pervasive Device Beijing 100190China
Unmanned aerial vehicle(UAV)network is vulnerable to jamming attacks,which may cause severe damage like communication outages.Due to the energy constraint,the source UAV cannot blindly enlarge the transmit power,along... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论