SlideShare a Scribd company logo
1 of 25
Download to read offline
SOME SECURITY ISSUES
OVERVIEW
 Introduction
 What is Cognitive Radio?
 Spectrum Sensing
 Primary User Emulation
 Simulation & Results
INTRODUCTION
 Evolution of numerous wireless applications.
 Limited Public Bandwidth or Spectrum
 Inefficient use of Licensed Spectrum
 What if one could use the licensed spectrum when no
primary users are using it?
Cognitive radio: some security issues
WHAT IS COGNITIVE RADIO?
 Intelligent Radio.
 Senses Environment and Spectrum(Cognitive
capability).
 Analyzes it(Self-organized capability).

 Adapts to it(Reconfigurable capability).
 Learns from the results.
General Architecture of Cognitive Radio
SPECTRUM SENSING
 Dynamic Spectrum Access (DSA)
 Distributed Spectrum Sensing (DSS)
 Common Control Channel (CCC)
Cognitive radio: some security issues
SPECTRUM SENSING
 Dynamic Spectrum Access (DSA)
 Distributed Spectrum Sensing (DSS)
 Common Control Channel (CCC)
SPECTRUM SENSING
 Dynamic Spectrum Access (DSA)
 Distributed Spectrum Sensing (DSS)
 Common Control Channel (CCC)
CCC

Cooperation
Optimization
SPECTRUM SENSING TECHNIQUES
 Matched Filter
 Cyclo-Stationary Feature
 Energy Detection
SPECTRUM SENSING TECHNIQUES
 Matched Filter
 Cyclo-Stationary Feature
 Energy Detection
SPECTRUM SENSING TECHNIQUES
 Matched Filter
 Cyclo-Stationary Feature
 Energy Detection
PRIMARY USER EMULATION
 Idle spectrum can be used by secondary users
without causing disturbance to the primary user.
 But these secondary users must co-operate and use
the spectrum fairly.
 Some secondary users prevent others from using this
idle spectrum by transmitting unrecognizable signals.
 i.e. they emulate (imitate) the primary users and
hence prevent secondary users from utilizing it.
 They are of two types:
 Selfish PUE attackers
 Malicious PUE attackers
SYSTEM MODEL FOR CRNs
Received power due to
Primary Transmitter,
Pr_p

PDF of Pr_p

Received power due to
Malicious users, Pr_m

PDF of Pr_m
SIMULATION & RESULTS
 The following slides contain the simulated
results of the PDFs of signals received by the
secondary receiver due to primary
transmitter and malicious users.
Cognitive radio: some security issues
Cognitive radio: some security issues
Cognitive radio: some security issues
SYSTEM MODEL FOR CRNs
SYSTEM MODEL ALTERATION
 As it can be seen, the results of the previous
system model are not desirable.
 So, another system model is presented to
counteract the PUE.
PROPOSED MODEL
Cognitive radio: some security issues

More Related Content

What's hot

Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesKuncoro Wastuwibowo
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radioNeha Singh
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksVatsala Sharma
 
Cognitive radio network
Cognitive radio networkCognitive radio network
Cognitive radio networkSuhad Malayshi
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radioAli Nasr
 
Dynamic spectrum access
Dynamic spectrum accessDynamic spectrum access
Dynamic spectrum accessSanjana Prasad
 
Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkChandra Sharma
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
Harish presentation
Harish presentationHarish presentation
Harish presentationpikuldash9
 
Cognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkCognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkSatyaki Mitra
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio RiyaSaini16
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationIffat Anjum
 

What's hot (20)

Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main Issues
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Cognitive radio network
Cognitive radio networkCognitive radio network
Cognitive radio network
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Dynamic spectrum access
Dynamic spectrum accessDynamic spectrum access
Dynamic spectrum access
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio Network
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Harish presentation
Harish presentationHarish presentation
Harish presentation
 
Cognitive radio (1)
Cognitive radio (1)Cognitive radio (1)
Cognitive radio (1)
 
Cognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-NetworkCognitive-Radio-Sensor-Network
Cognitive-Radio-Sensor-Network
 
Cognitive Radio
Cognitive Radio Cognitive Radio
Cognitive Radio
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
 

Similar to Cognitive radio: some security issues

Performance evaluation of different spectrum sensing techniques for realistic...
Performance evaluation of different spectrum sensing techniques for realistic...Performance evaluation of different spectrum sensing techniques for realistic...
Performance evaluation of different spectrum sensing techniques for realistic...ijwmn
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7sophiabelthome
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docIIRindia
 
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...Aastha Bhardwaj
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesIDES Editor
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSaroj Dhakal
 
Radar Of Radio Detection And Multiple Classification And...
Radar Of Radio Detection And Multiple Classification And...Radar Of Radio Detection And Multiple Classification And...
Radar Of Radio Detection And Multiple Classification And...Nancy Jarjis
 
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...IDES Editor
 
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET Journal
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET Journal
 
Master's Thesis Matti Sihvola 2009
Master's Thesis Matti Sihvola 2009Master's Thesis Matti Sihvola 2009
Master's Thesis Matti Sihvola 2009Matti Sihvola
 
An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...
An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...
An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...IOSR Journals
 
Toward forward link interference cancellation
Toward forward link interference cancellationToward forward link interference cancellation
Toward forward link interference cancellationShu Wang
 
Simulation of EMI Filters Using Matlab
Simulation of EMI Filters Using MatlabSimulation of EMI Filters Using Matlab
Simulation of EMI Filters Using Matlabinventionjournals
 
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...IJERA Editor
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 

Similar to Cognitive radio: some security issues (20)

energy_detection
energy_detectionenergy_detection
energy_detection
 
Performance evaluation of different spectrum sensing techniques for realistic...
Performance evaluation of different spectrum sensing techniques for realistic...Performance evaluation of different spectrum sensing techniques for realistic...
Performance evaluation of different spectrum sensing techniques for realistic...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
International journal of engineering issues vol 2015 - no 2 - paper7
International journal of engineering issues   vol 2015 - no 2 - paper7International journal of engineering issues   vol 2015 - no 2 - paper7
International journal of engineering issues vol 2015 - no 2 - paper7
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
Radar Of Radio Detection And Multiple Classification And...
Radar Of Radio Detection And Multiple Classification And...Radar Of Radio Detection And Multiple Classification And...
Radar Of Radio Detection And Multiple Classification And...
 
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...
Effect of Channel Variations on the Spectral Efficiency of Multiuser Diversit...
 
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
IRJET- Achieving Cognitive Radio for Improved Spectrum Utilization: An Implem...
 
Ijetcas14 443
Ijetcas14 443Ijetcas14 443
Ijetcas14 443
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
 
Master's Thesis Matti Sihvola 2009
Master's Thesis Matti Sihvola 2009Master's Thesis Matti Sihvola 2009
Master's Thesis Matti Sihvola 2009
 
An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...
An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...
An Efficient Performance of Mimo - Ofdm Based Cognitieve Radio System for Arr...
 
Toward forward link interference cancellation
Toward forward link interference cancellationToward forward link interference cancellation
Toward forward link interference cancellation
 
Simulation of EMI Filters Using Matlab
Simulation of EMI Filters Using MatlabSimulation of EMI Filters Using Matlab
Simulation of EMI Filters Using Matlab
 
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 

Recently uploaded

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 

Recently uploaded (20)

Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 

Cognitive radio: some security issues