Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (3)
the PHY protocol for zigbee
no vote
This is a PHY protocol for zigbee. In oder to accelarate the deploy of the practical zigbee system, we implement the code simulation to verify its performance on the PC with matlab language. There is detail description about source,channel decoding,constellation,pulse shapping,channel simulation,syncronization, demapper and decode, a good example for the fresh man.
wlliang
2016-11-08
2
1
the PHY protocol for zigbee
no vote
This is a PHY protocol for zigbee. In oder to accelarate the deploy of the practical zigbee system, we implement the code simulation to verify its performance on the PC with matlab language. There is detail description about source,channel decoding,constellation,pulse shapping,channel simulation,syncronization, demapper and decode, a good example for the fresh man.
wlliang
2016-11-08
0
1
Dynamic threshold SSDF's defense strategy
no vote
Application background cooperative spectrum sensing is regarded as an effective way to detect idle spectrum in cognitive radio networks (CRNs), and in malicious secondary users (SUS) can & nbsp; transmit spectrum sensing data tampering (SSDF) attacks & nbsp; interfere with the detection and threat of CRNs. In order to & nbsp; resist SSDF attacks, it is necessary to fuse & nbsp; the center to distinguish the credibility of reports from SUS. &Our cooperative spectrum sensing scheme is based on Bayesian reputation model CRNs. The key technology is based on the analysis of the relationship between threshold and Fc fusion value, and the defense probability SSDF attack is proposed based on the strategy of dynamic threshold. In this method, the dynamic threshold is updated according to the upper and lower limits of the fusion value, which is realized by the fusion value of the past observation results. Through this method, both false alarm and missed detection probability can be reduced in theory. Simulation results show that our proposed strategy is superior to static threshold strategy in resisting various SSDF attacks of CRNs.
wlliang
2015-07-23
0
1
No more~