Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Interference
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:38am
particle swarm optimization
weighted sum rate maximization
user grouping procedure
user association
swarm intelligence algorithms
Swarm Intelligence
Silicon carbide
Signal to noise ratio
resource management
resource allocation
Receivers
pubcrawl
PSO
power allocation
physical resource block allocation
5G
particle swarm optimisation
orthogonal clusters
nonorthogonal multiple access networks
Non-Orthogonal Multiple Access (NOMA)
NOMA networks
NOMA
multiple base stations
multi-access systems
joint user association-power allocation
Interference
Grey Wolf optimizer
Evolutionary algorithms
Compositionality
composability
biblio
Interference of Cyber Endanger using Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
on-line exchanges
Web structure associations
Web record remark
Support vector machines
Support Vector Machine(SVM)
support vector machine
sort machine
security of data
SDA
robotized revelation
Resiliency
pubcrawl
Predictive Metrics
persistent repeated mischief
PC systems
Patching
advanced badgering
monetary machine
mobile phones
line associations
less steeply-esteemed acknowledgment displays
internet
Interference
Hinduja
cyberbullying
cyber-tormenting cases
cyber endanger
cosmology
composability
burden their mates
basic ordinary language sections
assembling
biblio
Research on Nonlinear Frequency Hopping Communication Under Big Data
Submitted by grigby1 on Fri, 12/11/2020 - 1:41pm
Non - Linearity
Time-frequency Analysis
Time Frequency Analysis
statistical analysis
spread spectrum communication
security of data
security
Scalability
safety assessment
Resiliency
resilience
radiofrequency interference
pubcrawl
nonlinear frequency hopping communication
Big Data
Metrics
Interference
Frequency synchronization
Frequency modulation
Frequency Hopping Communication
frequency hop communication
Frequency conversion
data information
communication safety evaluation framework
communication data informatization processing methods
big data security
big data safety evaluation framework
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
biblio
Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications
Submitted by aekwall on Mon, 10/05/2020 - 10:54am
aggregated-query-as-a-secure-service
Dynamic Networks and Security
unlicensed secondary users search
RF spectrum database-driven opportunistic wireless communications
RF spectrum database server
RF channel sensing uncertainties
querying RF spectrum database
location based security
licensed primary users
grid leaders
grid followers
dynamic spectrum access and security
dynamic spectrum access
database-driven dynamic spectrum access approach
telecommunication security
radio spectrum management
wireless channels
Interference
delays
Databases
Metrics
Wireless communication
composability
pubcrawl
Resiliency
Radio frequency
security
biblio
Optimizing Spectrum Pooling for Multi-Tenant C-RAN Under Privacy Constraints
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
participating operators
finite-capacity backhaul links
finite-capacity fronthaul links
fronthaul/backhaul compression strategies
inter-onerator privacy
inter-operator cooperation
inter-tenant privacy constraints
multi-tenant
multitenant C-RAN
multitenant Cloud Radio Access Network system
downlink transmission
privacy constraint
private shared subbands
proprietary radio units
RAN sharing
shared subband
spectrum pooling
user equipments
CPS Privacy
radio access networks
Cloud Computing
data privacy
Human behavior
pubcrawl
privacy
optimization
cyber physical systems
Bandwidth
computer network security
Downlink
Interference
Human Factors
Quantization (signal)
bandwidth allocation
precoding
C-RAN
cloud processor
biblio
On Security Capability of Cooperative Communications in Energy Scavenging Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
relay networks (telecommunication)
Cognitive Radio Security
precise closed-form formula
power division
noncognitive networks
message recovering time
Manganese
ESCRNs
energy scavenging time
energy scavenging cognitive radio networks
energy scavenging
cooperative communications
SOP
secrecy outage
security
secrecy outage probability
cognitive radio
energy harvesting
Interference
Relays
cooperative communication
telecommunication network reliability
telecommunication power management
Analytical models
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Physical Layer Security of a Two-Hop Mixed RF-FSO System in a Cognitive Radio Network
Submitted by grigby1 on Fri, 09/18/2020 - 12:55pm
physical layer security
dual-hop transmission
end-to-end signal-to-noise-ratio
free space optical link
FSO
FSO links
gamma distribution
Gamma-Gamma distribution
licensed primary user
Nakagami channels
optical links
cognitive-radio system
physical layer security performance
PU receiver
relay
relaying
RF links
secrecy outage probability
two-hop mixed RF-FSO system
unlicensed secondary user
Cognitive Radio Security
cooperative communication
pubcrawl
resilience
Resiliency
Radio frequency
telecommunication security
Signal to noise ratio
Receivers
probability
telecommunication network reliability
Capacity planning
security
Relays
Rayleigh channels
Interference
cognitive radio
amplify and forward communication
asymmetric radio frequency link
atmospheric turbulence
average secrecy capacity
Cognitive Radio Network
biblio
Research of Low-Quality Laser Security Code Enhancement Technique
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
bilateral filter
adaptive filtering
Unsharp masking
mean square error methods
market circulation order
low-quality laser security code enhancement
Lasers
Laser security code
interference background
image enhancement algorithm
equalisers
contrast limited adaptive histogram equalization
Scalability
image enhancement
image colour analysis
image filtering
Interference
Filtering
filtering algorithms
Metrics
Image edge detection
pubcrawl
Resiliency
security
biblio
Research on Time Concealed Channel Technology of Cloud Computing Platform Based on Shared Memory
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
pubcrawl
Virtualization
Virtual machining
time-covert channels
time concealed channel technology
shared memory time covert channels
shared memory systems
shared memory
security of data
security issues
security
Scalability
Resiliency
resilience
Analytical models
interference methods
Interference
Entropy
data leakage
covert channels
covert channel interference
covert channel detection
covert channel
Compositionality
composability
cloud platform
cloud computing platform
Cloud Computing
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »