Zobrazeno 1 - 10
of 43
pro vyhledávání: '"Huihui Ding"'
Publikováno v:
Electronics Letters, Vol 59, Iss 18, Pp n/a-n/a (2023)
Abstract To achieve autonomous anti‐jamming routing for wireless mesh networks (WMNs) under the threat of unknown removable jammers, a Q‐learning anti‐jamming routing algorithm using the improved upper‐confidence‐bound (UCB) algorithm is pr
Externí odkaz:
https://doaj.org/article/f187315a4e9041d0b51a4fab7a6bb6f5
Publikováno v:
Frontiers in Microbiology, Vol 14 (2023)
Qinghai–Tibet Plateau is considered a region vulnerable to the effects of climate change. Studying the effects of climate change on the structure and function of soil microbial communities will provide insight into the carbon cycle under climate ch
Externí odkaz:
https://doaj.org/article/1dabc06bdc554a0fa5ef4bfc309ee436
Publikováno v:
Sensors, Vol 24, Iss 3, p 796 (2024)
This work investigates wireless covert communication in a multi-sensor asymmetric noise scenario. We adopt KL (Kullback–Leibler) divergence as the covertness constraint metric and mutual information as the transmission rate metric. To accurately ap
Externí odkaz:
https://doaj.org/article/0b0a890e76de42fc861267be23064a40
Publikováno v:
Applied Sciences, Vol 14, Iss 2, p 483 (2024)
This research investigates the feasibility of covert and reliable communication between Alice and Bob in the presence of a vigilant adversary, Willie, employing a jammer in a complex Gaussian channel. Alice strategically manipulates the noise-power r
Externí odkaz:
https://doaj.org/article/4266100df4b0483593c5b1183563a3b8
Publikováno v:
Applied Sciences, Vol 14, Iss 2, p 577 (2024)
This study explores the covert transmission of surveillance videos using QAM (quadrature amplitude modulation) constellations. By analyzing transmission strategies used in surveillance video systems, we adopt KL divergence as the constraint for cover
Externí odkaz:
https://doaj.org/article/e8f918f6d0da40e7bb734e73579a4579
Publikováno v:
Sensors, Vol 23, Iss 22, p 9240 (2023)
Wireless sensor networks (WSNs), integral components underpinning the infrastructure of the internet of things (IoT), confront escalating threats originating from attempts at malicious jamming. Nevertheless, the limited nature of the hardware resourc
Externí odkaz:
https://doaj.org/article/9043697cecec485a9f494db3f4eb9c11
Publikováno v:
Biomedicine & Pharmacotherapy, Vol 155, Iss , Pp 113683- (2022)
IFN-γ, a soluble cytokine being produced by T lymphocytes, macrophages, mucosal epithelial cells, or natural killer cells, is able to bind to the IFN-γ receptor (IFNγR) and in turn activate the Janus kinase (JAK)-signal transducer and transcriptio
Externí odkaz:
https://doaj.org/article/cd5f03123a0847e58a3bc329e3203382
Publikováno v:
Frontiers in Chemistry, Vol 10 (2022)
CeO2 with fusiform structures were prepared by the combined microwave–ultrasonic method, and their morphologies and surface structure were changed by simply adding different amounts of H2O (1–5 ml) to the precursor system. The addition of H2O cha
Externí odkaz:
https://doaj.org/article/0a3ae40333e4434e84bc490cefb6e60e
Publikováno v:
The Journal of Engineering (2019)
Compared with ground radars, space-borne bistatic radar shows great advantages in higher signal-to-noise ratio (SNR) and robuster security. Firstly, this study establishes space-borne geosynchronous satellite-low orbiting satellite (GEO-LEO) space–
Externí odkaz:
https://doaj.org/article/bb208f84f2d442e9843c7617fa4ccb66
Autor:
Wensheng Chen, Huihui Ding, Jiangrong Li, Fangwei Fu, Yueyao Li, Siying Xiao, Di Xu, Jie Lu, Jiangping Fang
Publikováno v:
Trees. 37:331-348