2024
DOI: 10.1016/j.dcan.2022.10.025
|View full text |Cite
|
Sign up to set email alerts
|

A new adaptive co-site broadband interference cancellation method with auxiliary channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Vice versa false positive ratio (FPR) is calculated as given in the below Eqs. (13) – (22) ( Jiang et al, 2022 ; Jiang & Li, 2022 ; Zhang et al, 2022b ). The error rate is given below: Table 3 presents the accuracy comparison on various datasets as shown.…”
Section: Resultsmentioning
confidence: 99%
“…Vice versa false positive ratio (FPR) is calculated as given in the below Eqs. (13) – (22) ( Jiang et al, 2022 ; Jiang & Li, 2022 ; Zhang et al, 2022b ). The error rate is given below: Table 3 presents the accuracy comparison on various datasets as shown.…”
Section: Resultsmentioning
confidence: 99%
“…A small value of the S 11 parameter guarantees that the antenna efficiently emits the majority of the transmitted power, preventing it from being wasted as reflected power. As a consequence, the overall efficacy of the system is enhanced, interference is reduced, and signal strength is increased [31].…”
Section: Design and Modellingmentioning
confidence: 99%
“…Due to the specific process of topology formation and the establishment of secure transmission channels between nodes, it is necessary to pre-assign keys to nodes before their deployment. This pre-assignment helps to reduce unnecessary communication overhead that would arise during key assignment while establishing secure transmission channels between neighboring nodes ( Farjamnia, Gasimov & Kazimov, 2019 ; Jiang et al, 2022 ). In this study, we have adopted the key distribution scheme proposed in Eschenauer & Gligor (2002) , which involves three steps: (1) Key pre-distribution phase: During this phase, a key pool is generated based on the size of the network.…”
Section: Dadie Algorithmmentioning
confidence: 99%