•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

A comparison between energy detection and coherent sensing under interference uncertainty

Author:
Makarfi, Abubakar U.
,
Hamdi, Khairi A.
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/ICROIT.2014.6798340
URI: https://libsearch.um.ac.ir:443/fum/handle/fum/1055480
Keyword(s): audio signal processing,n steganography,n audio steganography,n data hiding capacity,n intentional attacks,n robust substitution technique,n unintentional attacks,n Cryptography,n Genetics,n Robust,n attacks,n audio sample,n capacity
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    A comparison between energy detection and coherent sensing under interference uncertainty

Show full item record

contributor authorMakarfi, Abubakar U.
contributor authorHamdi, Khairi A.
date accessioned2020-03-12T21:38:36Z
date available2020-03-12T21:38:36Z
date issued2014
identifier other6951975.pdf
identifier urihttps://libsearch.um.ac.ir:443/fum/handle/fum/1055480
formatgeneral
languageEnglish
publisherIEEE
titleA comparison between energy detection and coherent sensing under interference uncertainty
typeConference Paper
contenttypeMetadata Only
identifier padid8186375
subject keywordsaudio signal processing
subject keywordsn steganography
subject keywordsn audio steganography
subject keywordsn data hiding capacity
subject keywordsn intentional attacks
subject keywordsn robust substitution technique
subject keywordsn unintentional attacks
subject keywordsn Cryptography
subject keywordsn Genetics
subject keywordsn Robust
subject keywordsn attacks
subject keywordsn audio sample
subject keywordsn capacity
identifier doi10.1109/ICROIT.2014.6798340
journal titleireless Communications and Networking Conference (WCNC), 2014 IEEE
filesize132829
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace