2013 IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments Proceedings (APUAVD) 2013
DOI: 10.1109/apuavd.2013.6705296
|View full text |Cite
|
Sign up to set email alerts
|

Spread-spectrum control channels for UAV based on the generalized binary Barker sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…In mathematics, the optimal ruler or ruler of Golomb is called a set of non-negative integers, arranged in the form of divisions on an imaginary line so that the distance between any two divisions is unique. In other words, throughout the line, it is impossible to find two numbers, the difference between which would be repeated twice [1,2].…”
Section: Solving the Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…In mathematics, the optimal ruler or ruler of Golomb is called a set of non-negative integers, arranged in the form of divisions on an imaginary line so that the distance between any two divisions is unique. In other words, throughout the line, it is impossible to find two numbers, the difference between which would be repeated twice [1,2].…”
Section: Solving the Problemmentioning
confidence: 99%
“…The main problem of modern theory and technology of communication and radio control is to increase the noise immunity of telecommunication systems and, in particular, command radio control lines, in the influence of both natural obstacles and created by the opponent artificial obstacles. One of the main concepts of increasing noise immunity, developed in this paper, is to quickly carry out a change in the working ensembles of codes, thereby increasing the immunity, energy and parametric secrecy of the communication system, as well as protection of information from unauthorized access [1,2,3,5].…”
Section: Introductionmentioning
confidence: 99%
“…The risk of successful UAS misuse is considerably increasing, and defense effectivity is decreasing, for example, in the following ways:A UAS is able to fulfil its task through autonomous flight without GPS [9,10];A swarm of UAVs can attack a target [11,12];A UAS is able to recognize a victim’s face and can target crowds [13,14];UASs have more remote control channels [15] and remote control options [16,17];UASs can be used to paralyze civilian air traffic control [18]. …”
Section: Introductionmentioning
confidence: 99%