I
nte
rna
t
io
na
l
J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
10
,
No
.
5
,
Octo
b
er
2
0
2
0
,
p
p
.
5
3
8
5
~
5
3
9
1
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
1
0
i
5
.
pp
5
3
8
5
-
5
3
9
1
5385
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m/in
d
ex
.
p
h
p
/I
JE
C
E
Erro
r
r
a
te
d
etec
ti
o
n
d
ue t
o
p
ri
m
a
r
y
u
ser
e
m
ula
tion
a
tt
a
ck in
c
o
g
nitive
r
a
dio
n
e
tw
o
rk
s
N.
Ar
m
i
1
,
W.
G
ha
ribi
2
,
W.
Z
.
K
ha
n
3
1
In
d
o
n
e
sia
n
I
n
stit
u
te o
f
S
c
ien
c
e
s,
Re
se
a
rc
h
Ce
n
ter f
o
r
El
e
c
tro
n
ics
a
n
d
T
e
lec
o
m
m
u
n
ica
ti
o
n
,
In
d
o
n
e
sia
1
De
p
a
rt
m
e
n
t
o
f
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
,
T
e
lk
o
m
Un
iv
e
rsit
y
,
In
d
o
n
e
sia
2
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
El
e
c
tri
c
a
l
E
n
g
in
e
e
rin
g
,
Un
i
v
e
rs
it
y
o
f
M
isso
u
ri
-
Ka
n
sa
s Cit
y
,
Un
it
e
d
S
tate
3
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter an
d
Ne
tw
o
rk
En
g
in
e
e
rin
g
,
Ja
z
a
n
Un
iv
e
rs
it
y
,
Kin
g
d
o
m
o
f
S
a
u
d
i
A
ra
b
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Au
g
31
,
2
0
1
9
R
ev
i
s
ed
A
p
r
16
,
2
0
2
0
A
cc
ep
ted
A
p
r
29
,
2
0
2
0
S
e
c
u
rit
y
th
re
a
t
is
a
c
ru
c
ial
is
su
e
in
c
o
g
n
it
iv
e
ra
d
io
n
e
tw
o
rk
(CRN).
T
h
e
se
th
re
a
t
s
c
o
m
e
f
ro
m
p
h
y
si
c
a
l
la
y
e
r,
d
a
ta
li
n
k
la
y
e
r,
n
e
t
wo
rk
la
y
e
r,
tran
sp
o
rt
lay
e
r,
a
n
d
a
p
p
li
c
a
ti
o
n
l
a
y
e
r.
He
n
c
e
,
se
c
u
rit
y
s
y
ste
m
to
a
ll
lay
e
rs
in
CRN
h
a
s
a
re
sp
o
n
si
b
il
i
ty
to
p
r
o
tec
t
th
e
c
o
m
m
u
n
ica
ti
o
n
b
e
tw
e
e
n
a
m
o
n
g
S
e
c
o
n
d
a
ry
Us
e
r
(S
U)
o
r
to
m
a
in
tain
v
a
li
d
d
e
tec
ti
on
t
o
th
e
p
r
e
se
n
c
e
o
f
P
rim
a
r
y
Us
e
r
(P
U)
sig
n
a
ls.
P
r
i
m
a
r
y
Us
e
r
E
m
u
latio
n
A
tt
a
c
k
(
P
UEA
)
is
a
th
re
a
t
o
n
p
h
y
sic
a
l
la
y
e
r
w
h
e
re
m
a
l
icio
u
s
u
se
r
e
m
u
late
s
P
U
sig
n
a
l.
T
h
is
p
a
p
e
r
stu
d
ies
th
e
e
ff
e
c
t
o
f
e
x
c
lu
siv
e
r
e
g
io
n
o
f
P
UEA
in
CR
N.
W
e
ta
k
e
tw
o
se
tt
in
g
o
f
e
x
c
lu
siv
e
d
istan
c
e
s,
3
0
m
a
n
d
5
0
m
,
w
h
e
re
th
is
ra
d
iu
s
o
f
a
re
a
is
f
re
e
o
f
m
a
li
c
io
u
s
u
se
rs.
P
r
o
b
a
b
i
l
it
y
o
f
f
a
ls
e
a
lar
m
(P
f
)
a
n
d
m
iss
d
e
tec
ti
o
n
(P
m
)
a
re
u
se
d
to
e
v
a
lu
a
te
th
e
p
e
r
f
o
r
m
a
n
c
e
s.
T
h
e
r
e
su
lt
sh
o
w
s
th
a
t
in
c
re
a
sin
g
d
istan
c
e
o
f
e
x
c
lu
siv
e
re
g
io
n
m
a
y
d
e
c
re
a
se
P
f
a
n
d
P
m
.
K
ey
w
o
r
d
s
:
C
o
g
n
iti
v
e
r
ad
io
Fals
e
d
etec
tio
n
Ma
licio
u
s
u
s
er
Miss
d
etec
tio
n
Sp
ec
tr
u
m
s
en
s
i
n
g
Co
p
y
rig
h
t
©
2
0
2
0
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Nasr
u
lla
h
A
r
m
i,
R
esear
ch
C
en
ter
f
o
r
E
lectr
o
n
i
cs
an
d
T
elec
o
m
m
u
n
icat
io
n
,
I
n
d
o
n
esia
n
I
n
s
titu
te
o
f
Scie
n
c
es,
C
is
it
u
s
tr
ee
t,
No
.
2
1
/1
5
4
D,
B
an
d
u
n
g
4
0
1
3
5
,
I
n
d
o
n
esia
.
E
m
ail:
n
asr
u
lla
h
.
ar
m
i
@
g
m
ai
l.c
o
m
1.
I
NT
RO
D
UCT
I
O
N
B
esid
es
s
en
s
in
g
an
d
a
cc
es
s
o
v
er
im
p
er
f
ec
t
ch
a
n
n
el
[
1
-
3]
,
s
ec
u
r
it
y
t
h
r
ea
t
is
cr
u
c
ial
is
s
u
e
i
n
co
g
n
iti
v
e
r
ad
io
.
I
t
co
m
es
f
r
o
m
m
o
s
t
la
y
er
s
u
c
h
as
p
h
y
s
ical,
d
ata
lin
k
,
n
et
w
o
r
k
,
tr
an
s
p
o
r
t,
o
r
a
p
p
l
icatio
n
la
y
er
[
4
-
10
]
.
Un
li
k
e
tr
ad
itio
n
al
w
ir
eles
s
n
e
t
w
o
r
k
s
w
h
er
e
o
p
er
ates
in
f
ix
e
d
s
p
ec
tr
u
m
,
co
g
n
iti
v
e
r
ad
io
n
et
w
o
r
k
s
o
p
er
ate
in
d
y
n
a
m
ic
s
p
ec
tr
u
m
w
h
er
e
u
s
er
o
p
p
o
r
tu
n
i
s
ticall
y
ac
ce
s
s
av
a
ila
b
le
s
p
ec
tr
u
m
c
h
a
n
n
e
l
w
it
h
p
r
i
o
r
s
en
s
i
n
g
[
1
1
-
14]
.
Hen
ce
,
v
ar
io
u
s
f
ac
to
r
s
m
u
s
t
b
e
tak
e
n
i
n
to
co
n
s
id
er
atio
n
s
i
n
ce
co
g
n
it
iv
e
r
ad
io
(
C
R
)
d
ea
ls
w
it
h
th
e
u
ti
lizatio
n
o
f
u
n
u
s
ed
s
p
ec
tr
u
m
in
o
p
p
o
r
tu
n
is
t
ic
m
a
n
n
er
w
i
th
t
h
e
u
n
s
ch
e
d
u
led
ap
p
ea
r
an
ce
o
f
p
r
im
ar
y
u
s
er
s
[
1
5
]
.
P
h
y
s
ical
la
y
er
i
s
th
e
lo
w
e
s
t
l
ev
el
w
h
ic
h
p
r
o
v
id
es
an
i
n
ter
f
ac
e
to
th
e
m
ed
iu
m
.
Sec
u
r
it
y
o
n
p
h
y
s
ica
l
la
y
er
is
r
elate
d
to
s
o
m
e
p
o
s
s
ib
le
attac
k
s
u
c
h
as
in
ten
t
io
n
al
j
am
m
in
g
attac
k
,
p
r
i
m
ar
y
r
ec
ei
v
er
j
am
m
in
g
attac
k
,
p
r
im
ar
y
u
s
er
e
m
u
latio
n
attac
k
,
an
d
o
v
er
lap
p
in
g
s
ec
o
n
d
ar
y
u
s
er
attac
k
.
I
n
te
n
tio
n
al
j
a
m
m
in
g
attac
k
m
ea
n
s
t
h
a
t
m
alicio
u
s
u
s
er
tr
an
s
m
it
s
ig
n
al
in
te
n
tio
n
a
ll
y
in
t
h
e
e
x
is
t
i
n
g
licen
s
e
b
an
d
s
a
n
d
j
am
s
p
r
im
ar
y
an
d
o
t
h
er
s
ec
o
n
d
ar
y
u
s
er
.
T
h
e
w
o
r
s
t c
as
e
is
o
cc
u
r
r
ed
w
h
e
n
m
alic
io
u
s
u
s
e
r
s
a
ttack
in
o
n
e
g
eo
g
r
ap
h
ic
al
ar
ea
an
d
m
o
v
e
t
o
an
o
th
er
ar
ea
v
er
y
q
u
ick
l
y
w
i
t
h
o
u
t
b
ei
n
g
id
e
n
ti
f
ied
.
T
h
e
u
n
k
n
o
w
n
lo
ca
tio
n
o
f
p
r
i
m
ar
y
u
s
er
is
a
b
en
ef
it
f
o
r
attac
k
er
s
to
la
u
n
ch
p
r
i
m
ar
y
r
ec
eiv
er
j
a
m
m
in
g
attac
k
.
T
h
e
attac
k
er
m
a
y
s
h
i
f
t
to
t
h
e
p
r
i
m
ar
y
r
ec
eiv
er
a
n
d
r
eq
u
ests
tr
an
s
m
is
s
io
n
f
r
o
m
s
e
co
n
d
ar
y
u
s
er
s
.
T
h
is
ca
s
e
ca
u
s
e
s
in
ter
f
er
en
ce
to
p
r
i
m
ar
y
r
ec
ei
v
er
.
I
n
C
R
N,
m
u
l
tip
le
s
ec
o
n
d
ar
y
n
et
w
o
r
k
s
p
er
f
o
r
m
s
e
n
s
i
n
g
f
o
r
a
v
ailab
le
s
p
ec
tr
u
m
to
ac
ce
s
s
at
th
e
s
a
m
e
r
eg
io
n
w
it
h
t
h
e
s
a
m
e
ti
m
e.
T
h
e
tr
an
s
m
is
s
io
n
f
r
o
m
m
a
licio
u
s
u
s
e
r
s
in
o
n
e
n
e
t
w
o
r
k
m
a
y
ca
u
s
e
i
n
ter
f
er
en
ce
to
th
e
p
r
i
m
ar
y
a
n
d
s
ec
o
n
d
ar
y
u
s
e
r
s
f
r
o
m
t
h
e
o
th
er
n
et
w
o
r
k
s
.
T
h
is
t
h
r
ea
t i
s
k
n
o
w
n
as
o
v
er
lap
p
in
g
s
ec
o
n
d
ar
y
u
s
er
attac
k
w
h
er
e
a
m
alic
io
u
s
u
s
er
m
a
y
also
i
m
itate
th
e
p
r
i
m
ar
y
u
s
er
.
T
h
e
f
ak
e
p
r
im
ar
y
s
i
g
n
a
l
is
co
n
s
id
er
ed
a
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
3
8
5
-
5391
5386
o
r
ig
in
al
s
ig
n
al
b
y
s
ec
o
n
d
ar
y
u
s
er
.
Hen
ce
,
s
ec
o
n
d
ar
y
u
s
er
r
ef
r
ain
f
r
o
m
tr
a
n
s
m
i
s
s
io
n
o
r
ter
m
i
n
ate
th
e
o
n
g
o
i
n
g
co
m
m
u
n
icatio
n
an
d
r
elea
s
e
t
h
e
f
r
eq
u
en
c
y
s
p
ec
tr
u
m
[
1
6
]
.
T
h
is
f
a
k
e
s
ig
n
al
tr
an
s
m
itted
b
y
m
a
licio
u
s
u
s
er
i
s
k
n
o
w
n
as p
r
i
m
ar
y
u
s
er
e
m
u
lat
io
n
attac
k
.
P
r
im
ar
y
u
s
er
e
m
u
latio
n
attac
k
i
s
a
th
r
ea
t
o
n
p
h
y
s
ical
la
y
er
.
I
t
h
ar
m
s
SU
to
ac
h
ie
v
e
t
h
e
co
r
r
ec
t
s
en
s
in
g
o
u
tco
m
e.
Ma
l
icio
u
s
u
s
er
at
tack
s
s
i
g
n
al
d
etec
tio
n
b
y
tr
an
s
m
i
tti
n
g
s
i
g
n
a
l
w
h
o
s
e
h
as
th
e
s
a
m
e
ch
ar
ac
ter
is
tic
a
s
p
r
i
m
ar
y
s
ig
n
a
l.
I
t c
au
s
e
s
SU
h
a
s
a
d
i
f
f
icu
lt
y
to
id
en
ti
f
y
v
ac
a
n
t
s
p
ec
tr
u
m
.
Ma
licio
u
s
u
s
er
d
o
es
n
o
t u
tili
ze
th
o
s
e
v
ac
a
n
t b
a
n
d
s
f
o
r
its
o
w
n
co
m
m
u
n
icatio
n
p
u
r
p
o
s
es.
T
h
ey
o
n
l
y
tr
a
n
s
m
it
f
a
k
e
p
r
i
m
ar
y
s
i
g
n
al
i
n
v
ac
an
t b
a
n
d
s
to
o
b
s
tr
u
ct
SU
f
r
o
m
d
etec
ti
n
g
o
r
ig
i
n
al
o
n
e.
T
h
e
ex
is
tin
g
w
o
r
k
s
r
elate
d
to
th
is
is
s
u
e
h
a
v
e
b
ee
n
d
o
n
e.
S
m
ar
t
attac
k
er
w
as
i
n
tr
o
d
u
c
ed
in
[
1
7
]
.
T
h
e
au
th
o
r
s
u
s
e
Ma
r
k
o
v
c
h
a
in
tech
n
iq
u
e
to
m
o
d
el
th
e
ac
tiv
itie
s
o
f
attac
k
er
s
.
T
h
en
,
en
er
g
y
d
etec
tio
n
o
f
attac
k
er
s
w
a
s
in
v
est
ig
ated
i
n
[
1
8
]
.
T
h
e
au
th
o
r
s
u
s
ed
NI
-
US
R
P
2
9
2
2
d
ev
ices
to
d
er
iv
e
p
r
o
b
ab
ilit
y
o
f
d
etec
tio
n
an
d
f
alse
alar
m
.
C
h
e
n
et
a
l
in
[
1
9
]
in
v
esti
g
a
ted
th
e
attac
k
er
s
w
h
ich
is
co
n
s
id
er
ed
as
in
ter
f
er
en
ce
to
r
esu
lt
in
ac
cu
r
ate
p
o
s
itio
n
o
f
p
r
i
m
ar
y
u
s
er
lo
ca
tio
n
.
T
h
e
au
th
o
r
s
i
m
p
le
m
en
ted
d
ir
ec
tio
n
al
an
te
n
n
a
to
ex
p
lo
r
e
p
o
s
itio
n
o
f
p
r
i
m
ar
y
tr
an
s
m
itter
.
T
h
e
u
s
ed
p
ar
a
m
eter
li
k
e
a
n
g
le,
ar
r
iv
al
ti
m
e,
a
n
d
s
tr
en
g
t
h
o
f
s
i
g
n
al
is
ex
p
lo
r
ed
to
d
etec
t
an
ac
cu
r
ate
p
o
s
itio
n
.
An
an
al
y
tical
o
f
s
u
cc
es
s
f
u
l
p
r
o
b
ab
ilit
y
to
attac
t
p
r
im
ar
y
u
s
er
lo
ca
tio
n
w
as
f
ir
s
tl
y
s
tu
d
ied
b
y
au
t
h
o
r
s
i
n
[
2
0
]
.
Fad
in
g
w
a
s
co
n
s
id
er
ed
in
to
ac
co
u
n
t
to
ca
lcu
late
s
u
cc
e
s
s
f
u
l
p
r
o
b
ab
ilit
y
o
f
attac
k
er
s
a
n
d
d
ef
i
n
e
a
lo
wer
li
m
it
b
y
ap
p
l
y
in
g
Fe
n
to
n
’
s
a
n
d
Ma
r
k
o
v
ap
p
r
o
x
i
m
a
tio
n
,
r
esp
ec
tiv
el
y
.
C
R
s
i
g
n
al
in
g
w
a
s
i
n
tr
o
d
u
ce
d
b
y
a
u
t
h
o
r
s
i
n
[
2
1
]
to
ea
s
e
ac
ce
s
s
in
g
a
v
ailab
le
s
p
ec
tr
u
m
ef
f
icie
n
tl
y
.
T
h
e
in
v
esti
g
atio
n
p
r
o
v
ed
t
h
at
th
e
f
r
a
m
e
w
o
r
k
is
ab
le
to
m
a
x
i
m
ize
SU
tr
an
s
m
i
s
s
io
n
r
ate
w
it
h
lo
w
p
r
o
b
ilit
y
o
f
m
is
s
d
etec
tio
n
a
n
d
p
r
o
b
ab
ilit
y
o
f
f
alse
alar
m
.
U
s
i
n
g
t
h
e
s
t
atis
tical
c
h
ar
ac
ter
is
tic
o
f
u
s
er
s
to
p
r
ev
en
t
P
UE
A
is
s
u
e
w
as p
r
o
p
o
s
ed
b
y
Gh
az
n
a
v
i e
t a
l [
2
2
]
.
T
h
e
u
s
ed
m
et
h
o
d
o
n
th
is
ar
tic
le
w
as
w
ell
p
r
o
v
ed
th
at
its
te
ch
n
iq
u
e
is
ab
le
to
in
cr
ea
s
e
th
e
d
etec
tio
n
p
er
f
o
r
m
a
n
ce
co
m
p
ar
ed
w
i
th
th
e
e
x
i
s
ti
n
g
w
o
r
k
s
.
I
n
v
e
s
t
ig
atio
n
o
f
p
r
i
m
ar
y
u
s
er
att
ac
k
er
s
w
i
th
b
lin
d
in
f
o
r
m
atio
n
o
f
u
s
er
s
w
as
p
r
esen
ted
b
y
a
u
th
o
r
s
i
n
[
2
3
]
.
T
h
e
y
i
n
v
e
s
ti
g
at
ed
m
i
s
s
d
etec
tio
n
r
ate
b
o
th
th
eo
r
etica
ll
y
a
n
d
ex
p
er
i
m
en
ta
l
l
y
d
if
f
er
en
t
n
u
m
b
er
o
f
SU.
Ho
w
e
v
er
,
th
e
d
is
a
v
ad
v
a
n
ta
g
es
o
f
th
is
s
tu
d
y
s
u
ch
a
s
ig
n
o
r
i
n
g
p
r
o
b
ab
ilit
y
o
f
f
al
s
e
d
etec
tio
n
an
d
t
h
e
r
ec
ei
v
ed
p
o
w
er
p
er
f
o
r
m
a
n
ce
p
er
f
o
r
m
a
n
ce
w
er
e
n
o
t
clea
r
l
y
p
r
esen
ted
.
T
h
e
t
ec
h
n
iq
u
e
to
r
ed
u
ce
th
e
i
m
p
ac
t
o
f
attac
k
er
s
t
o
p
r
im
ar
y
u
s
er
d
u
e
to
s
elf
is
h
an
d
m
alicio
u
s
u
s
er
s
w
a
s
in
tr
o
d
u
ce
d
b
y
au
t
h
o
r
s
in
[
2
4
]
.
T
h
ey
i
m
p
le
m
e
n
ted
g
a
m
e
s
tr
ate
g
y
to
co
u
n
ter
th
e
attac
k
er
an
d
r
ed
u
ce
th
e
er
r
o
r
r
ate
d
etec
tio
n
o
f
p
r
i
m
ar
y
u
s
er
.
T
h
e
ef
f
ec
t
o
f
n
u
m
b
er
o
f
attac
k
er
s
to
t
h
e
p
er
f
o
r
m
an
ce
o
f
d
etec
tio
n
in
P
UE
A
w
a
s
s
tu
d
ied
i
n
[
2
5
,
2
6
]
w
it
h
Ne
y
m
a
n
P
ea
r
s
o
n
d
e
cisi
o
n
tecn
iq
u
e.
T
h
e
y
co
n
cl
u
d
ed
th
at
i
n
cr
ea
s
i
n
g
n
u
m
b
er
o
f
attac
k
er
m
a
y
d
ec
r
ea
s
e
th
e
p
er
f
o
r
m
a
n
ce
.
T
h
is
p
ap
er
ex
p
lo
r
es
m
o
r
e
p
er
f
o
r
m
a
n
ce
a
f
f
ec
ted
b
y
r
ad
iu
s
o
f
e
x
cl
u
s
i
v
e
r
e
g
io
n
.
T
w
o
d
i
f
f
er
en
t
r
ad
iu
s
o
f
ex
cl
u
s
i
v
e
r
eg
io
n
v
al
u
es
i
s
co
n
s
id
er
ed
w
it
h
t
w
o
h
y
p
o
t
h
esi
s
o
f
Ne
y
m
a
n
P
ea
r
s
o
n
tech
n
iq
u
e
to
d
ec
id
e
th
e
ex
i
s
te
n
ce
o
f
p
r
i
m
ar
y
u
s
er
.
E
r
r
o
r
r
ates
d
etec
tio
n
s
u
c
h
as
f
alse
alar
m
a
n
d
m
is
s
d
etec
tio
n
ar
e
u
s
ed
to
p
r
esen
t
th
e
d
er
iv
ed
p
er
f
o
r
m
an
ce
ev
a
lu
atio
n
.
T
h
e
r
est
o
f
t
h
e
p
ap
er
is
o
r
g
an
ized
as
f
o
llo
w
s
.
Secti
o
n
2
d
is
cu
s
s
es
s
y
s
te
m
an
d
n
u
m
er
ical
m
o
d
el
co
n
s
id
er
ed
in
th
e
s
i
m
u
latio
n
.
T
h
e
d
er
iv
ed
r
esu
lt
an
d
d
is
cu
s
s
io
n
ar
e
p
r
esen
ted
in
s
ec
tio
n
3
.
Fin
a
ll
y
,
co
n
c
lu
s
io
n
i
s
tak
e
n
b
r
ief
l
y
in
Sectio
n
4
.
2.
P
RIM
ARY
USE
R
E
M
UL
A
T
I
O
N
A
T
T
A
CK
M
O
DE
L
T
h
e
m
aj
o
r
is
s
u
e
i
n
p
r
i
m
ar
y
s
ig
n
al
d
etec
t
io
n
i
s
h
o
w
S
Us
ca
n
id
en
ti
f
y
f
ak
e
p
r
i
m
a
r
y
s
i
g
n
al.
P
r
im
ar
y
u
s
er
e
m
u
latio
n
attac
k
(
P
UE
A
)
is
o
n
e
th
r
ea
t
o
n
p
h
y
s
ical
la
y
er
i
n
co
g
n
it
iv
e
r
ad
io
n
et
w
o
r
k
w
h
er
e
attac
k
er
tr
an
s
m
it
f
a
k
e
p
r
i
m
ar
y
s
i
g
n
al.
T
w
o
t
y
p
e
s
o
f
w
ell
-
k
n
o
w
n
P
UE
A
is
s
el
f
is
h
P
U
E
A
a
n
d
m
alicio
u
s
P
UE
A
.
A
t
tack
er
s
m
a
x
i
m
ize
i
ts
b
an
d
w
id
th
b
y
p
r
ev
e
n
tin
g
o
th
er
SUs
to
u
s
e
t
h
e
s
p
ec
tr
u
m
b
a
n
d
s
in
s
elf
is
h
P
UE
A
.
A
ttac
k
er
s
tr
a
n
s
m
it
s
i
g
n
al
to
r
ese
m
b
le
t
h
e
p
r
i
m
ar
y
s
ig
n
a
l.
W
h
e
r
ea
s
th
e
a
i
m
o
f
at
t
ac
k
er
s
i
n
m
alicio
u
s
P
UE
A
is
o
b
s
tr
u
cti
n
g
SU to
id
en
ti
f
y
th
e
v
ac
a
n
t sp
ec
tr
u
m
b
an
d
s
,
s
o
t
h
at
t
h
e
y
ca
n
n
o
t
u
s
e
t
h
o
s
e
b
an
d
s
.
T
w
o
t
y
p
e
o
f
er
r
o
r
s
ca
u
s
ed
b
y
P
UE
A
ar
e
p
r
o
b
ab
ilit
y
o
f
f
al
s
e
alar
m
(
P
f
)
an
d
m
i
s
s
d
etec
t
io
n
(
P
m
)
.
T
h
ese
t
w
o
d
etec
tio
n
er
r
o
r
s
ar
e
u
s
ed
as m
a
in
p
ar
a
m
eter
f
o
r
p
er
f
o
r
m
a
n
ce
ev
al
u
atio
n
.
Fig
u
r
e
1
d
escr
ib
es
a
b
r
ief
c
o
n
ce
p
t
o
f
h
o
w
attac
k
er
s
in
te
r
f
er
e
p
r
im
ar
y
u
s
er
d
etec
tio
n
.
A
s
f
ig
u
r
e,
th
er
e
ar
e
a
n
u
m
b
er
o
f
a
ttack
er
s
lo
ca
ted
o
n
a
cir
c
u
lar
n
et
w
o
r
k
w
i
th
r
ad
iu
s
R
a
n
d
s
i
n
g
le
s
ec
o
n
d
ar
y
u
s
er
lo
ca
ted
at
th
e
ce
n
ter
.
E
ac
h
at
tack
er
s
t
r
an
s
m
it
s
ig
n
al
a
m
o
n
g
ea
c
h
o
t
h
er
.
T
h
e
attac
k
er
s
(
M)
ar
e
d
i
s
tr
ib
u
ted
r
an
d
o
m
l
y
co
v
er
in
g
s
ec
o
n
d
ar
y
u
s
er
w
it
h
a
ce
r
tain
r
ad
iu
s
R
.
T
h
ese
attac
k
er
s
tr
a
n
s
m
it
s
i
g
n
al
in
d
ep
en
d
en
tl
y
.
O
n
t
h
e
o
t
h
er
s
id
e,
s
ec
o
n
d
ar
y
u
s
er
i
s
lo
ca
t
ed
at
th
e
ce
n
ter
o
f
n
et
w
o
r
k
w
it
h
t
h
e
d
is
tan
ce
Dp
f
r
o
m
p
r
i
m
ar
y
tr
a
n
s
m
it
ter
.
Fix
ed
lo
ca
tio
n
o
f
p
r
i
m
ar
y
tr
an
s
m
i
tter
p
o
s
s
ib
l
y
to
tr
a
n
s
m
it
s
i
g
n
al
w
it
h
p
o
w
er
P
t.
Me
an
w
h
il
e,
s
ec
o
n
d
ar
y
u
s
er
i
s
f
r
ee
attac
k
er
s
at
r
ad
iu
s
R
o
w
h
er
e
th
is
r
eg
io
n
is
k
n
o
w
n
as e
x
l
u
s
i
v
e
ar
e
a
o
f
s
ec
o
n
d
ar
y
u
s
er
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
E
r
r
o
r
r
a
te
d
etec
tio
n
d
u
e
to
p
r
i
ma
r
y
u
s
er e
mu
la
tio
n
a
tta
ck
in
co
g
n
itive
r
a
d
io
n
etw
o
r
ks (
N
.
A
r
mi)
5387
R
R
o
Dp
Se
c
o
n
d
a
r
y
u
s
e
r
M
a
l
i
c
i
o
u
s
u
s
er
P
r
i
m
a
r
y
tr
a
n
s
m
i
tt
er
Fig
u
r
e
1
.
P
r
im
ar
y
u
s
er
e
m
u
la
ti
o
n
a
ttack
(
P
UE
A
)
m
o
d
el
As
d
escr
ib
ed
in
f
i
g
u
r
e,
w
e
h
a
v
e
a
n
u
m
b
er
o
f
attac
k
er
s
lo
ca
t
ed
at
(
,
)
w
h
er
e
j
is
v
al
u
e
w
it
h
r
a
n
g
e
r
an
g
e
1
≤
j
≤
M.
T
h
en
p
r
o
b
a
b
ilit
y
d
en
s
i
t
y
f
u
n
ctio
n
(
P
DF)
o
f
is
d
er
iv
ed
as f
o
llo
w
s
[
1
0
]
.
(
)
=
2
2
−
2
≤
≤
(
1
)
w
h
er
e
is
eq
u
all
y
d
is
tr
ib
u
ted
a
t
r
an
g
e
(
−
,
)
.
T
h
en
,
t
h
e
r
ec
eiv
ed
p
o
w
er
o
f
tr
an
s
m
itted
s
ig
n
al
f
r
o
m
p
r
i
m
ar
y
tr
an
s
m
itter
is
d
er
i
v
ed
as
b
ello
w
s
:
(
)
=
−
2
2
(
2
)
w
h
er
e
2
=
10
10
,
~
(
0
,
2
)
.
Sin
ce
an
d
h
av
e
a
f
i
x
ed
v
al
u
es
,
th
e
n
t
h
e
P
DF
o
f
(
)
u
s
e
s
a
lo
g
n
o
r
m
al
d
is
t
r
ib
u
tio
n
a
n
d
ca
n
b
e
ca
lcu
lated
as f
o
llo
w
s
:
(
)
(
)
=
1
√
2
{
(
10
10
−
)
2
2
2
}
(
3
)
w
h
er
e
=
10
10
an
d
=
10
10
−
20
10
T
h
e
to
tal
p
o
w
er
r
ec
eiv
ed
f
r
o
m
attac
k
er
s
at
t
h
e
s
ec
o
n
d
ar
y
u
s
e
r
is
d
er
iv
ed
b
y
:
(
)
=
∑
−
4
2
=
1
(4
)
w
h
er
e
an
d
2
ar
e
th
e
d
is
tan
ce
an
d
s
h
ad
o
w
in
g
b
et
w
ee
n
ℎ
m
al
icio
u
s
u
s
er
a
n
d
s
ec
o
n
d
ar
y
u
s
er
,
r
esp
ec
tiv
el
y
.
2
=
10
10
w
h
er
e
~
(
0
,
2
)
.
T
h
e
r
ig
h
t
s
id
e
o
f
eq
u
atio
n
(
4
)
ab
o
v
e
is
lo
g
n
o
r
m
a
ll
y
d
is
tr
ib
u
ted
r
an
d
o
m
v
ar
iab
le
o
f
t
h
e
f
o
r
m
10
10
w
h
er
e
~
(
,
2
)
,
w
h
er
e
is
d
er
iv
ed
by
t
h
e
f
o
llo
w
i
n
g
eq
u
atio
n
:
=
10
10
−
40
10
(
5
)
T
h
e
P
DF o
f
co
n
s
id
er
ed
as
p
o
s
itio
n
s
o
f
al
l
attac
k
er
s
ca
n
b
e
d
er
iv
ed
as
b
ello
w
s
:
|
(
)
=
1
√
2
{
(
10
10
−
)
2
2
2
}
(
6
)
is
d
ef
in
ed
as
t
h
e
v
ec
to
r
ele
m
e
n
ts
of
1
,
2
,
…,
.
T
h
en
,
2
an
d
ar
e
d
er
iv
ed
as th
e
eq
u
atio
n
b
ello
w
s
:
2
=
1
2
[
1
+
(
2
2
−
1
)
∑
2
=
1
(
∑
=
1
)
2
]
(
7
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
3
8
5
-
5391
5388
=
1
(
∑
=
1
)
−
2
(
2
−
2
)
(
8
)
T
h
e
P
DF o
f
th
e
r
ec
eiv
ed
p
o
w
e
r
f
r
o
m
attac
k
er
s
is
ca
lc
u
lated
as f
o
llo
w
s
:
(
)
=
∫
∏
|
(
)
(
|
)
(
)
=
1
(
9
)
Fu
t
h
er
m
o
r
e,
ca
lcu
lat
io
n
o
f
th
e
r
ec
eiv
er
p
o
w
er
f
r
o
m
attac
k
er
u
s
es
lo
g
n
o
r
m
all
y
d
i
s
tr
ib
u
t
ed
r
an
d
o
m
v
ar
iab
le
w
ith
an
d
as b
ello
w
s
:
(
)
=
1
√
2
{
−
(
10
10
−
)
2
2
2
}
(
1
0
)
T
h
e
v
alu
e
s
o
f
an
d
ca
n
b
e
d
er
iv
ed
w
h
e
n
is
co
n
s
id
er
ed
as
a
lo
g
n
o
r
m
all
y
d
is
tr
ib
u
te
d
r
an
d
o
m
v
ar
iab
le
as
w
r
itte
n
i
n
eq
u
atio
n
s
b
ello
w
s
:
2
=
1
2
(
[
(
(
)
)
2
]
−
2
[
(
)
]
)
(
1
1
)
=
1
(
2
[
(
)
]
)
−
1
2
[
(
(
)
)
2
]
(
1
2
)
Fro
m
(
6
)
,
th
e
v
alu
e
s
o
f
an
d
[
|
]
is
d
er
iv
ed
b
y
t
h
e
f
o
llo
w
in
g
eq
u
atio
n
:
[
(
)
|
]
=
∗
2
2
2
(
1
3
)
w
h
er
e
=
10
10
(
∗
−
4
)
(
1
4
)
=
10
10
(
∗
−
4
)
=
∗
−
4
(
1
5
)
Hen
ce
,
[
(
)
|
]
=
∗
−
4
∗
2
2
2
(
1
6
)
B
y
i
n
te
g
r
atin
g
eq
u
at
io
n
o
v
er
r
an
g
e
o
f
1
,
2
,
…,
,
it b
ec
o
m
e
s
:
[
(
)
]
=
∫
(
)
∗
−
4
∗
2
2
2
=
∫
2
2
2
∫
2
2
−
2
∗
−
4
(
1
7
)
I
f
s
ec
o
n
d
ar
y
u
s
er
is
lo
ca
ted
at
co
o
r
d
in
ate
(
0
,
0
)
,
m
ea
n
i
n
g
th
a
t
=
[
(
)
]
=
2
2
2
∫
2
2
−
2
∗
1
4
[
(
)
]
=
2
2
2
2
2
(
1
8
)
Usi
n
g
d
ec
is
io
n
cr
iter
io
n
o
f
N
e
w
m
a
n
P
ea
r
s
o
n
,
w
e
as
s
u
m
e
t
h
at
M
1
as
p
r
i
m
ar
y
s
i
g
n
al
tr
an
s
m
i
s
s
io
n
i
n
p
r
o
g
r
ess
,
an
d
M
2
is
em
u
lat
io
n
attac
k
i
n
p
r
o
g
r
ess
.
T
h
is
s
tu
d
y
i
m
p
le
m
e
n
ts
t
w
o
er
r
o
r
r
a
te
f
o
r
p
er
f
o
r
m
a
n
ce
ev
alu
a
tio
n
,
t
h
o
s
e
ar
e
f
alse
ala
r
m
an
d
m
is
s
d
etec
tio
n
.
Fals
e
d
etec
tio
n
m
ea
n
s
m
is
tak
e
d
ete
ctio
n
b
y
s
ec
o
n
d
ar
y
u
s
er
w
h
er
e
m
al
icio
u
s
u
s
er
as
attac
k
er
s
i
g
n
a
l
is
d
etec
ted
as
p
r
im
ar
y
s
i
g
n
a
l.
Me
an
w
h
ile,
m
is
s
d
etec
tio
n
m
ea
n
s
s
ec
o
n
d
ar
y
u
s
er
d
etec
t
p
r
i
m
ar
y
u
s
er
s
i
g
n
al
as
attac
k
er
s
i
g
n
al.
Hen
ce
,
s
ec
o
n
d
ar
y
u
s
er
i
s
u
n
a
w
ar
e
an
d
lo
s
s
an
o
p
p
o
r
tu
n
it
y
to
ac
ce
s
s
av
ai
lab
le
s
p
ec
tr
u
m
.
T
h
e
d
ec
is
io
n
v
ar
i
ab
le
is
d
er
iv
ed
b
y
in
c
lu
d
i
n
g
t
h
e
r
ec
eiv
ed
s
i
g
n
al
p
o
w
er
as f
o
llo
w
s
:
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
E
r
r
o
r
r
a
te
d
etec
tio
n
d
u
e
to
p
r
i
ma
r
y
u
s
er e
mu
la
tio
n
a
tta
ck
in
co
g
n
itive
r
a
d
io
n
etw
o
r
ks (
N
.
A
r
mi)
5389
Λ
=
(
)
(
)
(
)
(
1
9
)
T
h
e
d
ec
is
io
n
is
ac
h
i
v
ed
b
y
co
m
p
ar
i
n
g
Λ
w
it
h
th
e
t
h
r
es
h
o
ld
as b
ello
w
s
:
Λ
≤
1
: P
r
im
ar
y
s
ig
n
al
tr
an
s
m
is
s
io
n
Λ
≥
2
:
E
m
u
lat
io
n
attac
k
in
p
r
o
g
r
es
s
T
h
en
,
er
r
o
r
r
ate
is
d
eter
m
i
n
ed
b
y
t
h
e
f
o
llo
w
in
g
d
ec
is
io
n
r
u
le:
{
2
|
1
}
=
p
r
o
b
ab
ilit
y
o
f
m
i
s
s
ed
d
etec
t
io
n
,
w
h
er
e
d
ec
id
es
2
w
h
e
n
1
is
tr
u
e.
{
1
|
2
}
=
p
r
o
b
ab
ilit
y
o
f
f
al
s
e
alar
m
,
w
h
er
e
d
ec
id
es
1
w
h
e
n
2
is
tr
u
e.
T
h
o
s
e
m
e
n
tio
n
ed
er
r
o
r
r
ate
f
o
r
f
in
a
l d
ec
is
io
n
ab
o
v
e
ca
n
b
e
wr
itten
m
ath
e
m
atica
ll
y
a
s
f
o
llo
w
s
:
{
2
|
1
}
=
∫
(
)
(
)
=
Λ
≥
(
2
0
)
{
1
|
2
}
=
∫
(
)
(
)
Λ
≤
(
2
1
)
3.
RE
SU
L
T
S
A
ND
AN
AL
Y
SI
S
T
h
is
s
ec
tio
n
d
is
c
u
s
s
es
t
h
e
d
er
i
v
ed
r
esu
lt
a
n
d
p
er
f
o
r
m
a
n
ce
a
n
al
y
s
i
s
f
o
r
th
e
ex
cl
u
s
iv
e
r
eg
io
n
ef
f
ec
t
o
f
P
UE
A
.
W
e
co
n
s
id
er
ed
t
w
o
d
is
tan
ce
s
f
o
r
r
ad
iu
s
o
f
e
x
clu
s
iv
e
r
eg
io
n
,
3
0
m
an
d
5
0
m
f
r
o
m
th
e
ce
n
ter
o
f
n
et
w
o
r
k
ce
ll.
As
d
escr
ib
ed
i
n
Fig
u
r
e
1
,
a
b
r
ief
co
n
ce
p
t
h
o
w
m
alicio
u
s
u
s
er
as
attac
k
er
in
ter
f
er
e
p
r
i
m
ar
y
s
ig
n
al
d
etec
tio
n
,
w
it
h
a
ce
r
tain
n
u
m
b
er
o
f
m
a
licio
u
s
u
s
er
s
l
o
ca
ted
o
u
t
o
f
ex
clu
s
i
v
e
r
eg
io
n
tr
an
s
m
it
tin
g
f
ak
e
p
r
im
ar
y
s
i
g
n
a
l.
I
t
is
ass
u
m
ed
th
at
f
ix
s
ec
o
n
d
ar
y
u
s
er
s
ta
n
d
at
th
e
ce
n
ter
o
f
ci
r
cu
lar
n
e
t
wo
r
k
ce
ll
w
it
h
r
ad
iu
s
R
=
5
0
0
m
,
=
4
,
=
8
,
=
5
.
5
,
p
r
im
ar
y
tr
an
s
m
itter
p
o
w
er
=
150
an
d
th
e
d
is
tan
c
e
f
r
o
m
p
r
i
m
ar
y
tr
an
s
m
i
tter
to
s
ec
o
n
d
ar
y
u
s
er
D
p
=
1
0
0
k
m
.
N
u
m
b
er
o
f
at
tack
er
s
i
s
s
et
to
M
=
1
0
u
s
er
s
.
Firstl
y
,
w
e
d
e
f
in
e
r
ad
iu
s
o
f
e
x
clu
s
i
v
e
r
eg
io
n
i
n
to
R
o
=
3
0
m
.
Si
m
u
latio
n
i
s
ex
ec
u
ted
b
y
5
0
0
ti
m
es
.
P
r
o
b
ab
ilit
y
o
f
f
al
s
e
alar
m
i
s
d
er
iv
ed
as
s
h
o
w
n
i
n
Fi
g
u
r
e
2
.
I
ts
p
er
f
o
r
m
an
ce
i
s
v
ar
ied
f
r
o
m
0
.
0
0
4
6
to
0
.
0
0
8
7
as
a
f
u
n
c
tio
n
o
f
s
i
m
u
lat
io
n
ti
m
e
s
.
T
h
e
av
er
ag
e
v
al
u
e
i
s
ac
h
iev
e
d
ar
o
u
n
d
0
.
0
0
5
7
.
Me
an
w
h
ile,
th
e
p
er
f
o
r
m
an
ce
o
f
p
r
o
b
a
b
ilit
y
o
f
m
is
s
d
etec
tio
n
is
s
h
o
w
n
i
n
F
ig
u
r
e
3
.
Si
m
u
la
tio
n
i
s
e
x
ec
u
ted
b
y
5
0
0
r
u
n
t
i
m
es.
T
h
e
d
er
iv
ed
r
esu
lt
s
ar
e
v
ar
ied
f
r
o
m
0
.
0
0
5
5
to
0
.
0
0
7
5
as
f
u
n
ct
io
n
o
f
s
i
m
u
latio
n
ti
m
e
s
.
Ho
w
e
v
er
,
th
e
av
er
ag
e
v
al
u
e
i
s
ac
h
iev
ed
ar
o
u
n
d
0
.
0
0
6
3
.
Fig
u
r
e
2
.
P
r
o
b
ab
ilit
y
o
f
f
al
s
e
alar
m
d
u
r
in
g
5
0
0
s
i
m
u
lat
io
n
ti
m
es
w
i
th
p
a
r
a
m
et
er
R
=
5
0
0
m
,
R
o
=
3
0
m
an
d
n
u
m
b
er
o
f
atta
ck
er
s
M
=
1
0
Fig
u
r
e
3
.
P
r
o
b
ab
ilit
y
o
f
m
i
s
s
d
etec
tio
n
d
u
r
i
n
g
5
0
0
s
i
m
u
lat
io
n
ti
m
es
w
i
th
p
ar
a
m
et
er
R
=
5
0
0
m
,
R
o
=
3
0
m
an
d
n
u
m
b
er
o
f
atta
ck
er
s
M
=
1
0
Seco
n
d
l
y
,
w
e
r
ep
lace
th
e
d
is
tan
ce
o
f
r
ad
iu
s
o
f
e
x
clu
s
i
v
e
r
eg
io
n
b
y
5
0
m
.
T
h
is
s
t
u
d
y
o
b
s
er
v
e
s
th
e
e
f
f
ec
t
o
f
ex
c
lu
s
iv
e
r
eg
io
n
to
th
e
p
er
f
o
r
m
a
n
ce
o
f
d
etec
t
io
n
d
u
e
to
attac
k
er
s
b
y
ch
a
n
g
in
g
th
e
r
ad
iu
s
o
f
ex
clu
s
i
v
e
r
eg
io
n
.
T
h
e
p
er
f
o
r
m
an
ce
r
es
u
lt
s
ar
e
d
er
iv
ed
as
s
h
o
w
n
i
n
f
i
g
u
r
e
s
.
Fig
u
r
e
4
s
h
o
w
s
t
h
e
p
er
f
o
r
m
a
n
ce
o
f
p
r
o
b
ab
ilit
y
o
f
f
al
s
e
d
etec
ti
o
n
w
it
h
r
ad
iu
s
o
f
e
x
clu
s
i
v
e
r
eg
io
n
R
o
=
5
0
m
.
T
h
e
v
alu
e
s
ar
e
v
ar
ied
f
r
o
m
0
.
0
0
2
5
to
0
.
0
0
6
5
as
a
f
u
n
ct
io
n
o
f
s
i
m
u
latio
n
ti
m
e
s
.
T
h
e
av
er
ag
e
v
al
u
e
i
s
ac
h
iev
ed
at
0
.
0
0
3
3
.
P
r
o
b
ab
ili
ty
o
f
f
alse
d
etec
t
io
n
d
ec
r
ea
s
es
w
h
e
n
co
m
p
ar
ed
w
it
h
t
h
e
ca
s
e
o
f
R
o
=
3
0
m
.
P
er
f
o
r
m
an
ce
o
f
p
r
o
b
a
b
ilit
y
o
f
m
i
s
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
5
3
8
5
-
5391
5390
d
etec
tio
n
is
s
h
o
w
n
i
n
Fi
g
u
r
e
5
.
I
ts
r
esu
lt
is
f
l
u
ctu
ated
f
r
o
m
0
.
0
0
2
9
to
0
.
0
0
4
7
.
Ho
w
e
v
er
,
t
h
e
av
er
a
g
e
r
esu
l
t
is
ac
h
iev
ed
ar
o
u
n
d
0
.
0
0
3
3
.
Fu
r
th
er
m
o
r
e,
C
DF
o
f
f
alse
alar
m
an
d
m
i
s
s
d
etec
tio
n
p
r
o
b
ab
ilit
y
is
p
r
esen
ted
i
n
Fig
u
r
e
6
an
d
Fi
g
u
r
e
7
.
T
h
e
d
er
iv
ed
r
esu
lt
s
s
h
o
w
t
h
at
th
e
lar
g
er
r
ad
iu
s
o
f
e
x
cl
u
s
iv
e
r
e
g
io
n
is
u
s
ed
,
t
h
e
n
ac
h
iev
e
le
s
s
f
alse a
lar
m
an
d
m
is
s
d
etec
tio
n
p
r
o
b
ab
ilit
ies
.
Fig
u
r
e
4
.
P
r
o
b
ab
ilit
y
o
f
f
al
s
e
alar
m
d
u
r
in
g
5
0
0
s
i
m
u
lat
io
n
ti
m
es
w
i
th
p
ar
a
m
et
er
R
=
5
0
0
m
,
R
o
=
5
0
m
an
d
n
u
m
b
er
o
f
atta
ck
er
s
M
=
1
0
Fig
u
r
e
5
.
P
r
o
b
ab
ilit
y
o
f
m
i
s
s
d
etec
tio
n
d
u
r
i
n
g
5
0
0
s
i
m
u
lat
io
n
ti
m
es
w
i
th
p
ar
a
m
et
er
R
=
5
0
0
m,
R
o
=
5
0
m
an
d
n
u
m
b
er
o
f
atta
ck
er
s
M
=
1
0
Fig
u
r
e
6
.
C
DF o
f
f
alse a
lar
m
p
r
o
b
a
b
ilit
y
(
P
f
)
Fig
u
r
e
7
.
C
DF o
f
m
is
s
d
etec
ti
o
n
p
r
o
b
ab
ilit
y
(
P
m
)
4.
CO
NCLU
SI
O
N
T
h
e
ef
f
ec
t
o
f
r
ad
iu
s
o
f
ex
cl
u
s
iv
e
r
eg
io
n
in
p
r
i
m
ar
y
u
s
er
em
u
latio
n
attac
k
u
n
d
er
Ney
m
a
n
P
ea
r
s
o
n
tech
n
iq
u
es
h
a
s
b
ee
n
s
t
u
d
ied
.
T
h
e
s
tatis
tical
m
o
d
el
f
o
r
f
al
s
e
alar
m
an
d
m
i
s
s
d
etec
tio
n
p
r
o
b
a
b
ilit
y
i
s
als
o
d
is
cu
s
s
ed
.
E
x
cl
u
s
i
v
e
r
eg
io
n
i
s
an
ar
ea
w
h
er
e
s
ec
o
n
d
ar
y
u
s
er
f
r
ee
o
f
at
tack
er
s
.
T
h
e
s
i
m
u
latio
n
s
h
o
w
s
t
h
at
in
cr
ea
s
i
n
g
r
ad
iu
s
o
f
th
i
s
ar
ea
ca
n
d
ec
r
ea
s
e
eith
er
p
r
o
b
a
b
ilit
y
o
f
f
al
s
e
d
etec
tio
n
o
r
m
is
s
d
etec
tio
n
.
T
h
e
lar
g
er
r
ad
iu
s
o
f
ex
cl
u
s
iv
e
r
e
g
io
n
is
t
ak
en
i
n
f
l
u
en
ce
s
to
ac
h
iev
e
le
s
s
f
al
s
e
alar
m
an
d
m
is
s
d
etec
ti
o
n
r
ate
.
T
h
is
s
tu
d
y
co
n
s
id
er
ed
o
n
e
p
r
i
m
ar
y
tr
a
n
s
m
itter
w
h
ic
h
is
lo
ca
ted
at
a
ce
r
tain
d
is
ta
n
ce
(
1
0
0
k
m
)
a
w
a
y
f
r
o
m
s
ec
o
n
d
ar
y
u
s
er
.
Fo
r
f
u
r
t
h
er
s
tu
d
y
,
it
w
ill b
e
co
n
s
id
er
ed
t
w
o
o
r
m
u
ltip
le
p
r
i
m
ar
y
b
ase
s
tatio
n
w
i
th
d
i
f
f
er
en
t
d
is
tan
ce
s
.
RE
F
E
R
E
NC
E
S
[1
]
N.
A
r
m
i,
e
t
a
l.
,
“
S
e
n
si
n
g
a
n
d
a
c
c
e
ss
o
v
e
r
i
m
p
e
r
f
e
c
t
c
h
a
n
n
e
l
in
o
p
p
o
r
t
u
n
isti
c
sp
e
c
tru
m
a
c
c
e
ss
s
y
ste
m
,
”
2
0
1
1
Na
ti
o
n
a
l
Po
st
g
ra
d
u
a
te Co
n
fer
e
n
c
e
,
Ku
a
la L
u
m
p
u
r,
p
p
.
1
-
5
,
2
0
1
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
E
r
r
o
r
r
a
te
d
etec
tio
n
d
u
e
to
p
r
i
ma
r
y
u
s
er e
mu
la
tio
n
a
tta
ck
in
co
g
n
itive
r
a
d
io
n
etw
o
r
ks (
N
.
A
r
mi)
5391
[2
]
S
.
A
k
in
a
n
d
M
.
C.
G
u
rso
y
,
“
P
e
rfo
rm
a
n
c
e
A
n
a
l
y
sis
o
f
Co
g
n
it
iv
e
Ra
d
io
S
y
ste
m
s
W
it
h
I
m
p
e
r
f
e
c
t
C
h
a
n
n
e
l
S
e
n
si
n
g
a
n
d
Esti
m
a
ti
o
n
,
”
i
n
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
C
o
mm
u
n
ica
ti
o
n
s
,
v
o
l.
6
3
,
n
o
.
5
,
p
p
.
1
5
5
4
-
1
5
6
6
,
M
a
y
2
0
1
5
.
[3
]
I.
U.
Oh
a
e
ri,
e
t
a
l.
,
“
In
v
e
stig
a
ti
n
g
th
e
Eff
e
c
t
o
f
I
m
p
e
r
f
e
c
t
S
e
n
sin
g
o
n
S
p
e
c
tru
m
P
e
rf
o
rm
a
n
c
e
in
Co
g
n
it
iv
e
Ra
d
i
o
N
e
tw
o
rk
s,
”
2
0
1
7
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Co
m
p
u
t
a
ti
o
n
a
l
S
c
ien
c
e
a
n
d
Co
m
p
u
t
a
ti
o
n
a
l
I
n
telli
g
e
n
c
e
(
CS
CI)
,
L
a
s
V
e
g
a
s,
NV
,
p
p
.
6
3
8
-
6
4
4
,
2
0
1
7
.
[4
]
C
.
N.
M
a
th
u
r
a
n
d
K.
P
.
S
u
b
h
a
lak
sh
a
m
i,
“
S
e
c
u
rit
y
is
su
e
s
in
c
o
g
n
it
i
v
e
ra
d
io
n
e
tw
o
rk
s,”
Co
g
n
it
ive
n
e
two
rk
:
T
o
wa
rd
s
S
e
lf
-
Awa
re
Ne
two
rk
s
,
Jo
h
n
&
W
il
e
y
,
L
td
,
p
p
.
2
7
1
-
2
9
1
,
2
0
0
7
.
[5
]
X
.
Z
h
a
n
g
a
n
d
C.
L
i,
“
Co
n
str
u
c
ti
n
g
se
c
u
re
c
o
g
n
it
iv
e
w
irele
ss
n
e
tw
o
rk
s
e
x
p
e
rien
c
e
s
a
n
d
c
h
a
ll
e
n
g
e
s,”
W
ire
les
s
Co
mm
u
n
ica
ti
o
n
s a
n
d
M
o
b
il
e
C
o
mp
u
ti
n
g
,
v
o
l.
1
0
,
n
o
.
1
,
p
p
.
5
5
-
69
,
20
1
0
.
[6
]
J.
L
i,
e
t
a
l.
,
“
A
su
rv
e
y
o
f
s
e
c
u
rit
y
is
su
e
s
in
Co
g
n
it
iv
e
Ra
d
io
Ne
tw
o
rk
s,
”
in
Ch
in
a
C
o
mm
u
n
ica
ti
o
n
s
,
v
o
l.
1
2
,
n
o
.
3
,
p
p
.
1
3
2
-
1
5
0
,
M
a
r
.
2
0
1
5
.
[7
]
A
.
S
.
Ha
m
o
o
d
a
n
d
S
.
B
.
S
a
d
k
h
a
n
,
“
Co
g
n
i
ti
v
e
ra
d
io
n
e
tw
o
rk
se
c
u
rit
y
st
a
tu
s
a
n
d
c
h
a
ll
e
n
g
e
s,
”
2
0
1
7
An
n
u
a
l
Co
n
fer
e
n
c
e
o
n
Ne
w
T
re
n
d
s
i
n
In
f
o
rm
a
ti
o
n
&
Co
mm
u
n
ica
ti
o
n
s
T
e
c
h
n
o
lo
g
y
Ap
p
li
c
a
t
io
n
s
(
NT
ICT
)
,
Ba
g
h
d
a
d
,
p
p
.
1
-
6
,
2
0
1
7
.
[8
]
S
.
Ho
lc
o
m
b
a
n
d
D.
B.
Ra
w
a
t,
“
Re
c
e
n
t
se
c
u
rit
y
issu
e
s
o
n
c
o
g
n
it
iv
e
ra
d
io
n
e
tw
o
rk
s:
A
su
rv
e
y
,
”
S
o
u
t
h
e
a
stCo
n
2
0
1
6
,
No
rf
o
lk
,
V
A
,
p
p
.
1
-
6
,
2
0
1
6
.
[9
]
S
.
B.
S
a
d
k
h
a
n
a
n
d
D
.
M
.
Re
d
a
,
“
S
e
c
u
rit
y
Iss
u
e
s
o
f
Co
g
n
it
iv
e
Ra
d
io
Ne
tw
o
rk
,
”
2
0
1
9
2
n
d
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
E
n
g
in
e
e
rin
g
T
e
c
h
n
o
l
o
g
y
a
n
d
i
ts A
p
p
li
c
a
ti
o
n
s (
IICET
A)
,
A
l
-
Na
j
e
f
,
Ira
q
,
p
p
.
1
1
7
-
1
2
2
,
2
0
1
9
.
[1
0
]
Y.
Ya
o
,
e
t
a
l.
,
“
Dy
n
a
m
i
c
S
p
e
c
tru
m
Ac
c
e
s
s
W
it
h
P
h
y
sic
a
l
L
a
y
e
r
S
e
c
u
rit
y
:
A
G
a
m
e
-
Ba
s
e
d
Ja
m
m
in
g
A
p
p
ro
a
c
h
,
”
i
n
IEE
E
Acc
e
ss
,
v
o
l.
6
,
p
p
.
1
2
0
5
2
-
1
2
0
5
9
,
2
0
1
8
.
[1
1
]
A
.
S
.
Kh
o
b
ra
g
a
d
e
a
n
d
R.
D.
Ra
u
t
,
“
Hy
b
rid
S
p
e
c
tru
m
S
e
n
sin
g
M
e
t
h
o
d
f
o
r
Co
g
n
it
iv
e
Ra
d
i
o
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
,
v
o
l.
7
,
n
o.
5
,
p
p
.
2
6
8
3
-
2
6
9
5
,
2
0
1
7
.
[1
2
]
F
.
L
i,
e
t
a
l.
,
“
D
y
n
a
m
i
c
S
p
e
c
tru
m
A
c
c
e
ss
Ne
t
w
o
rk
s
W
it
h
He
ter
o
g
e
n
e
o
u
s
Us
e
rs:
Ho
w
to
P
rice
th
e
S
p
e
c
tru
m
?
”
in
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
Veh
icu
l
a
r
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
6
7
,
n
o
.
6
,
p
p
.
5
2
0
3
-
5
2
1
6
,
Ju
n
.
2
0
1
8
.
[1
3
]
K.
Um
e
b
a
y
a
sh
i,
e
t
a
l.
,
“
De
sig
n
o
f
S
p
e
c
tru
m
Us
a
g
e
D
e
tec
ti
o
n
in
W
id
e
b
a
n
d
S
p
e
c
tru
m
M
e
a
su
re
m
e
n
ts,
”
in
IEE
E
Acc
e
ss
,
v
o
l.
7
,
p
p
.
1
3
3
7
2
5
-
1
3
3
7
3
7
,
2
0
1
9
.
[1
4
]
S
.
L
ien
,
e
t
a
l.
,
“
Ra
n
d
o
m
A
c
c
e
ss
o
r
S
c
h
e
d
u
l
in
g
:
Op
t
im
u
m
LT
E
L
ice
n
se
d
-
A
ss
isted
A
c
c
e
ss
to
Un
li
c
e
n
se
d
S
p
e
c
tru
m
,
”
in
IEE
E
Co
mm
u
n
ica
t
io
n
s L
e
tt
e
rs
, v
o
l.
2
0
,
n
o
.
3
,
p
p
.
5
9
0
-
5
9
3
,
M
a
r
.
2
0
1
6
.
[1
5
]
F
.
Z
.
El
Ba
h
i,
e
t
a
l.
,
“
P
e
rf
o
rm
a
n
c
e
Ev
a
lu
a
ti
o
n
o
f
En
e
rg
y
De
te
c
to
r
Ba
se
d
S
p
e
c
tru
m
S
e
n
sin
g
f
o
r
Co
g
n
it
iv
e
Ra
d
io
u
sin
g
NI US
R
P
-
2
9
3
0
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
,
v
ol
.
7
,
n
o
.
4
,
p
p
.
1
9
3
4
-
1
9
4
0
,
2
0
1
7
.
[1
6
]
R.
Ch
e
n
a
n
d
J.
P
a
rk
,
“
En
su
r
in
g
tr
u
stw
o
rth
y
sp
e
c
tru
m
s
e
n
sin
g
in
c
o
g
n
it
iv
e
ra
d
io
n
e
tw
o
rk
s,”
in
Pro
c
e
e
d
in
g
s
o
f
IEE
E
Wo
rk
sh
o
p
o
n
Ne
tw
o
rk
in
g
T
e
c
h
n
o
l
o
g
ies
f
o
r S
o
ft
w
a
re
De
fi
n
e
d
R
a
d
i
o
Ne
two
rk
s (
S
DR
)
,
p
p
.
1
1
0
-
1
1
9
,
2
0
0
6
.
[1
7
]
A
.
Ka
ri
m
i,
e
t
a
l.
,
“
S
m
a
rt
T
ra
ffic
-
Aw
a
re
P
rim
a
r
y
Us
e
r
E
m
u
latio
n
A
tt
a
c
k
a
n
d
Its
Im
p
a
c
t
o
n
S
e
c
o
n
d
a
ry
Us
e
r
T
h
ro
u
g
h
p
u
t
Un
d
e
r
Ra
y
leig
h
F
lat
F
a
d
in
g
Ch
a
n
n
e
l,
”
in
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
In
fo
rm
a
t
io
n
Fo
re
n
sic
s
a
n
d
S
e
c
u
rity
,
v
o
l.
1
5
,
p
p
.
6
6
-
8
0
,
2
0
2
0
.
[1
8
]
E.
C
.
M
u
ñ
o
z
,
e
t
a
l.
,
“
De
tec
ti
o
n
o
f
M
a
li
c
io
u
s
P
rim
a
r
y
Us
e
r
E
m
u
latio
n
o
n
M
o
b
il
e
C
o
g
n
it
iv
e
Ra
d
i
o
N
e
tw
o
rk
s,
”
2
0
1
9
In
ter
n
a
t
io
n
a
l
Co
n
fer
e
n
c
e
o
n
In
fo
rm
a
t
io
n
S
y
ste
ms
a
n
d
Co
m
p
u
ter
S
c
ien
c
e
(
INCIS
COS
)
,
Q
u
it
o
,
Ecu
a
d
o
r
,
p
p
.
1
4
4
-
149
,
2
0
1
9
.
[1
9
]
R.
Ch
e
n
,
e
t
a
l.
,
“
De
f
e
n
c
e
a
g
a
in
s
t
p
rim
a
r
y
u
se
r
e
m
u
latio
n
a
tt
a
c
k
s
in
c
o
g
n
it
iv
e
ra
d
io
n
e
tw
o
rk
s,”
I
EE
E
J
o
u
rn
a
l
o
n
S
e
lec
ted
Are
a
s
in
Co
mm
u
n
ica
ti
o
n
s,
S
p
e
c
ia
l
Iss
u
e
o
n
Co
g
n
i
ti
v
e
Ra
d
i
o
T
h
e
o
ry
a
n
d
Ap
p
li
c
a
ti
o
n
s
,
v
o
l.
2
6
,
n
o
.
1
,
Ja
n
.
2
0
0
8
.
[2
0
]
S
.
A
n
a
n
d
,
e
t
a
l.
,
“
A
n
a
n
a
ly
ti
c
a
l
m
o
d
e
l
f
o
r
p
rim
a
r
y
u
se
r
e
m
u
latio
n
a
tt
a
c
k
s
in
c
o
g
n
it
iv
e
ra
d
io
n
e
tw
o
rk
s,”
in
3
rd
I
EE
E
S
y
mp
o
si
u
m o
f
Ne
w
Fro
n
ti
e
rs
in
D
y
n
a
mic
S
p
e
c
tru
m A
c
c
e
ss
Ne
two
rk
s (
Dy
S
PA
N)
,
2
0
0
8
.
[2
1
]
M
.
Ka
rim
i
a
n
d
S
.
M
.
S
.
S
a
d
o
u
g
h
,
“
Ef
f
icie
n
t
T
ra
n
s
m
issio
n
S
trate
g
y
f
o
r
Co
g
n
it
iv
e
Ra
d
i
o
S
y
ste
m
s
Un
d
e
r
P
rim
a
r
y
Us
e
r
E
m
u
latio
n
A
tt
a
c
k
,
”
in
IEE
E
S
y
ste
ms
J
o
u
rn
a
l
,
v
o
l.
1
2
,
n
o
.
4
,
p
p
.
3
7
6
7
-
3
7
7
4
,
2
0
1
8
.
[2
2
]
M
.
G
h
a
z
n
a
v
i
a
n
d
A
.
Ja
m
sh
id
i,
“
De
fe
n
c
e
a
g
a
in
st
p
rima
r
y
u
se
r
e
m
u
latio
n
a
tt
a
c
k
u
sin
g
sta
ti
stica
l
p
ro
p
e
rti
e
s
o
f
th
e
c
o
g
n
it
iv
e
ra
d
io
re
c
e
iv
e
d
p
o
w
e
r,
”
i
n
IET
C
o
mm
u
n
ica
ti
o
n
s
,
v
o
l.
1
1
,
n
o
.
9
,
p
p
.
1
5
3
5
-
1
5
4
2
,
2
0
1
7
.
[2
3
]
Z.
Jin
,
e
t
a
l.
,
“
De
tec
ti
n
g
p
rim
a
r
y
u
se
r
e
m
u
latio
n
a
tt
a
c
k
s
in
d
y
n
a
m
ic
sp
e
c
tru
m
a
c
c
e
s
s
n
e
tw
o
rk
s,
”
in
2
0
0
9
IE
EE
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
C
o
mm
u
n
ica
t
io
n
s (
ICC’2
0
0
9
)
,
p
p
.
1
-
5,
2
0
0
9
.
[2
4
]
N.
Ng
u
y
e
n
-
T
h
a
n
h
,
e
t
a
l.
,
“
S
u
r
v
e
il
lan
c
e
stra
teg
i
e
s
a
g
a
in
st
p
ri
m
a
r
y
u
se
r
e
m
u
latio
n
a
tt
a
c
k
in
c
o
g
n
it
iv
e
ra
d
i
o
n
e
tw
o
rk
s,
”
in
IEE
E
T
r
a
n
sa
c
ti
o
n
s
o
n
W
ire
les
s Co
mm
u
n
ic
a
ti
o
n
s
,
v
o
l
.
1
4
,
n
o
.
9
,
p
p
.
4
9
8
1
-
4
9
9
3
,
S
e
p
2
0
1
5
.
[2
5
]
N.
A
r
m
i,
e
t
a
l.
,
“
M
a
li
c
io
u
s
u
se
r
a
tt
a
c
k
in
c
o
g
n
it
iv
e
ra
d
io
n
e
tw
o
rk
s,”
TE
L
KOM
NIKA
T
e
l
e
c
o
mm
u
n
ica
t
io
n
,
Co
mp
u
t
in
g
,
El
e
c
tro
n
ics
,
a
n
d
Co
n
tro
l
,
v
o
l
.
1
5
,
n
o.
3
,
p
p
.
1
0
9
6
-
1
1
0
2
,
2
0
1
7
.
[2
6
]
D
.
S
.
V
e
rn
e
k
a
r
,
“
A
n
In
v
e
stig
a
ti
o
n
Of
S
e
c
u
rit
y
Ch
a
ll
e
n
g
e
s
In
Co
g
n
it
iv
e
Ra
d
io
Ne
tw
o
rk
s,”
T
h
e
sis
,
Un
iv
e
rsity
o
f
Ne
b
ra
sk
a
,
2
0
1
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.