Browse
Search
Explore more content
flow_diagram.
pdf
(24 kB)
File info
Download file
Fullscreen
Malicious User Attacks In Decentralised Cognitive Radio Networks - Proposed Algorithm Flow Diagram
Cite
Download
(24 kB)
Share
Embed
figure
posted on 2020-10-01, 11:39
authored by
Arun Sivakumaran
Arun Sivakumaran
The flow diagram of the algorithm that is the core output of the research project.
Funding
NRF SARChI Chair for ASN
History
Department/Unit
Department of Electrical, Electronic, and Computer Engineering
Usage metrics
Engineering, Built Environment and Information Technology
Categories
Electrical engineering not elsewhere classified
Keywords
Cognitive radio networks
Probabilistic inference
Electrical and Electronic Engineering not elsewhere classified
Licence
CC BY 4.0
Exports
Select an option
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC