2021
DOI: 10.1016/j.apacoust.2020.107820
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of wave fluctuation on underwater acoustic communication based USV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Furthermore, USVs are also considered as communication hubs for accessing maritime radio networks and underwater communication simultaneously, performing the role of air-to-underwater gateway. Researchers [189] emphasized the influence of the random wave fluctuation in underwater acoustic communication for USVs in underwater node communication. Ref.…”
Section: ) Usv-assisted Maritime Communicationsmentioning
confidence: 99%
“…Furthermore, USVs are also considered as communication hubs for accessing maritime radio networks and underwater communication simultaneously, performing the role of air-to-underwater gateway. Researchers [189] emphasized the influence of the random wave fluctuation in underwater acoustic communication for USVs in underwater node communication. Ref.…”
Section: ) Usv-assisted Maritime Communicationsmentioning
confidence: 99%
“…Some scholars have also done communication test related experiments [21], under the premise of ensuring that the USV and MCS are in a dedicated communication channel, the bandwidth required for the navigation information exchange, and the experimental results have been obtained. [22] Test communication ability based on underwater sound. [23] conducted ocean communications and tested long-distance communications.…”
Section: Communication System Testmentioning
confidence: 99%
“…By obtaining the necessary original materials, determine and establish the function list, including the aircraft top-level function list, the main function list of the system, the external interface function diagram, etc. After the system architecture and functions are determined, the normal model modeling of the system can be carried out [5][6] .…”
Section: Model-based Security Analysismentioning
confidence: 99%