Login / Signup
Two-path successive relaying and jamming for securing the primary system.
Dawei Wang
Pinyi Ren
Yichen Wang
Li Sun
Qinghe Du
Published in:
WPMC (2016)
Keyphrases
</>
shortest path
endpoints
computer vision
information security
databases
neural network
information systems
decision making
knowledge base
search algorithm
digital libraries
optimal path
path length
transmission line
path selection