![](images/graphics/blank.gif)
Scheme layer
-
Lecture Distributed systems (3/E) - Chapter 4: Communication provide students with content about: basic networking model; low-level layers; transport layer; middleware layer; an adapted layering scheme; types of communication; basic RPC operation; sending out multiple RPCs; client-to-server binding (DCE);... Please refer to the detailed lecture content!
54p
diepkhinhchau
18-09-2023
4
4
Download
-
Continued part 1, part 2 of ebook "Internet of things: Architectures, protocols and standards" provides readers with contents including: chapter 5 - security and privacy in the IoT; chapter 6 - cloud and fog computing for the IoT; chapter 7 - the IoT in practice;...
194p
hanlinhchi
29-08-2023
9
4
Download
-
Lecture Network + Guide to Networks (6th Edition) - Chapter 4: Introduction to TCP/IP Protocols, objectives of this chapter: Identify and explain the functions of the core TCP/IP protocols; Explain the TCP/IP model and how it corresponds to the OSI model; Discuss addressing schemes for TCP/IP in IPv4 and IPv6 and explain how addresses are assigned automatically using DHCP (Dynamic Host Configuration Protocol).
68p
chankora08
04-07-2023
4
3
Download
-
In practice, fading channel coefficients are estimated imperfectly at receivers. In this paper, I propose and analyze a cooperative communication scheme under physical layer security with imperfect CSI. In this scheme, a source node transmits secure data to a destination node D with a help of a relay node against an eavesdropper node without direct links of source-destination and source-eavesdropper.
6p
vidoctorstrange
06-05-2023
2
2
Download
-
This paper proposes a method of ranking load in Microgird system based on the calculation of priority weights on the continuity of power supply of the loads. The proposed method applies the covariance matrix of the criterion layer to determine values of each criterion.
9p
visusanwojcicki
28-06-2022
9
3
Download
-
Wireless networks - Lecture 33: TCP over wireless networks. The main topics covered in this chapter include: motivation; TCP variants; issues in heterogeneous wireless networks; TCP schemes for wireless; hard-state transport layer approaches; soft-state cross layer signalling approaches;...
28p
haoasakura
30-05-2022
15
3
Download
-
In this paper, we propose a novel method to estimate and remove the jamming signals from multiple multi-antenna jammers in a two-way relay network with multi-antenna legitimate and relay nodes. We carefully consider the signals in the time slots in order to exploit the repetition of the signals and design the transmitted signals which can work in different cases.
8p
cothumenhmong11
10-05-2021
18
3
Download
-
The quasi-3D shear deformation theory, which takes the thickness stretching effect into account, is adopted to formulate a finite element formulation for computing vibration characteristics. The accuracy of the derived formulation is confirmed through a comparison study. The numerical result reveals that the foundation supporting area plays an important role on the vibration behavior of the plates, and the effect of the layer thickness ratio on the frequencies is governed by the supporting area.
24p
nguaconbaynhay11
07-04-2021
19
2
Download
-
The element using hierarchical functions to interpolate the displacements and rotation is efficient, and it is capable to give accurate dynamic responses by small number of the elements. The effects of the moving mass parameters, material distribution, layer thickness ratio and inclined angle on the dynamic behavior of the FGSW beam are examined and highlighted.
18p
nguaconbaynhay11
07-04-2021
13
1
Download
-
This trend has attracted increasing concerns from both academia and industry. This paper addresses how physical layer security can protect secret data compare with the traditional cryptographic encryption and which is the better cooperative relaying scheme with the state of the art approached methods in wireless relaying beamforming network.
9p
vivirginia2711
09-12-2020
14
2
Download
-
Chapter 28 - Security. In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.
64p
nanhankhuoctai10
23-07-2020
22
3
Download
-
The following will be discussed in this chapter: Where we stand on layers, data representation and signaling used, data encoding, reasons for choosing encoding schemes, factors involved, digital data to analog signal (ASK, FSK, PSK), analog data to digital signal.
62p
nanhankhuoctai8
23-06-2020
7
0
Download
-
The effect of the periodic oscillation of the gravitational field, known as g-jitter, on the free convection from a vertical plate is investigated in the present paper. The problem has been simplified by the laminar boundary layer and Boussinesq approximations. The fully implicit finite-difference scheme is used to solve the dimensionless system of the governing equations. The results for laminar flow of air (Pr = 0.72) and water (Pr = 7.00) are presented for different values of the amplitudes and frequencies of the g-jitter.
11p
12120609
01-06-2020
23
1
Download
-
This paper reviews the main technical solutions adopted by the next-generation mobile broadcasting standard DVB-NGH, the handheld evolution of the second-generation digital terrestrial TV standard DVB-T2.
12p
son248
24-03-2020
20
1
Download
-
The Digital Video Broadcasting Next Generation Handheld (DVB-NGH) standard has adopted many advanced technologies, including overhead reduction schemes, to maximize the system capacity. However, some of the overhead reduction schemes of Layer-l (LI) signaling result in increased initial capture time delays. In order to get a more flexible trade-off between overhead reduction and initial capture time delay, a full-truncated Ll signaling scheme is proposed in DVB-NGH systems. Simulation results demonstrate the effectiveness ofthe proposed scheme.
5p
son248
24-03-2020
14
1
Download
-
Ground improvement technique by prefabricated vertical drain (PVD) in combination with vacuum preloading is widely used to facilitate consolidation process and reduce residual settlement. However, this technique seem hardly be estimated by both analytical method and numerical method because it has complex boundary conditions (such as vacuum pressure changing with time). Moreover, lateral displacements caused by this technique are also significant problem.
18p
chauchaungayxua1
03-12-2019
43
1
Download
-
In this paper, a new strategy of cross layer algorithm is proposed based on the characteristics of reactive routing and multi-hop jumping. In addition, artificial bee colony algorithm is performed to calculate the contention window of the nodes along the routing path over MAC layer
7p
vititan2711
13-08-2019
12
0
Download
-
In this paper the principle operation of a conventional output feedback receding horizon controller based on LQR is presented quickly first and then some opportunities to improve its performance by integrating into intelligent control scheme are discussing.
12p
visumika2711
17-07-2019
6
0
Download
-
The IEEE 802.16 std. includes medium access control (MAC) and physical (PHY) layer specifications and is consider to be a promising technology. Bandwidth reservation is employed to provide quality of service (QoS) to guarantee different services specified in the standard. A bandwidth request/grant scheme is defined in the IEEE 802.16 standard.
6p
girlsseek
27-02-2019
33
0
Download
-
In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.
41p
tangtuy09
26-04-2016
54
3
Download