2022
DOI: 10.1155/2022/1066331
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Communication Network Security System Based on Big Data Information Transmission Technology

Abstract: This paper establishes a unified perception information transmission model for the difference in the number of cognitive radio users in wireless communication network systems. The model can effectively improve the utilization of spectrum resources. At the same time, this paper introduces a cyclic delay full diversity sensing information coding transmission scheme for the security risks of wireless communication networks. We established a system simulation model to compare performance under different correlatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…Additionally, there are also risks of manipulation and disinformation related to the use of data in political campaigns. By leveraging algorithms and sophisticated data analysis techniques, political parties can create political narratives that suit their targets' preferences, even if that means spreading false or misleading information (Zhao & Ouyang, 2022). Apart from that, the use of Big Data can also create a digital divide in political participation.…”
Section: Resultsmentioning
confidence: 99%
“…Additionally, there are also risks of manipulation and disinformation related to the use of data in political campaigns. By leveraging algorithms and sophisticated data analysis techniques, political parties can create political narratives that suit their targets' preferences, even if that means spreading false or misleading information (Zhao & Ouyang, 2022). Apart from that, the use of Big Data can also create a digital divide in political participation.…”
Section: Resultsmentioning
confidence: 99%
“…It is easily intercepted as it propagates. This brings many potential threats to wireless communication [14].…”
Section: Related Workmentioning
confidence: 99%