intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Scheme layer

Xem 1-20 trên 75 kết quả Scheme layer
  • Lecture Distributed systems (3/E) - Chapter 4: Communication provide students with content about: basic networking model; low-level layers; transport layer; middleware layer; an adapted layering scheme; types of communication; basic RPC operation; sending out multiple RPCs; client-to-server binding (DCE);... Please refer to the detailed lecture content!

    pdf54p diepkhinhchau 18-09-2023 4 4   Download

  • Continued part 1, part 2 of ebook "Internet of things: Architectures, protocols and standards" provides readers with contents including: chapter 5 - security and privacy in the IoT; chapter 6 - cloud and fog computing for the IoT; chapter 7 - the IoT in practice;...

    pdf194p hanlinhchi 29-08-2023 9 4   Download

  • Lecture Network + Guide to Networks (6th Edition) - Chapter 4: Introduction to TCP/IP Protocols, objectives of this chapter: Identify and explain the functions of the core TCP/IP protocols; Explain the TCP/IP model and how it corresponds to the OSI model; Discuss addressing schemes for TCP/IP in IPv4 and IPv6 and explain how addresses are assigned automatically using DHCP (Dynamic Host Configuration Protocol).

    pdf68p chankora08 04-07-2023 4 3   Download

  • In practice, fading channel coefficients are estimated imperfectly at receivers. In this paper, I propose and analyze a cooperative communication scheme under physical layer security with imperfect CSI. In this scheme, a source node transmits secure data to a destination node D with a help of a relay node against an eavesdropper node without direct links of source-destination and source-eavesdropper.

    pdf6p vidoctorstrange 06-05-2023 2 2   Download

  • This paper proposes a method of ranking load in Microgird system based on the calculation of priority weights on the continuity of power supply of the loads. The proposed method applies the covariance matrix of the criterion layer to determine values of each criterion.

    pdf9p visusanwojcicki 28-06-2022 9 3   Download

  • Wireless networks - Lecture 33: TCP over wireless networks. The main topics covered in this chapter include: motivation; TCP variants; issues in heterogeneous wireless networks; TCP schemes for wireless; hard-state transport layer approaches; soft-state cross layer signalling approaches;...

    ppt28p haoasakura 30-05-2022 15 3   Download

  • In this paper, we propose a novel method to estimate and remove the jamming signals from multiple multi-antenna jammers in a two-way relay network with multi-antenna legitimate and relay nodes. We carefully consider the signals in the time slots in order to exploit the repetition of the signals and design the transmitted signals which can work in different cases.

    pdf8p cothumenhmong11 10-05-2021 18 3   Download

  • The quasi-3D shear deformation theory, which takes the thickness stretching effect into account, is adopted to formulate a finite element formulation for computing vibration characteristics. The accuracy of the derived formulation is confirmed through a comparison study. The numerical result reveals that the foundation supporting area plays an important role on the vibration behavior of the plates, and the effect of the layer thickness ratio on the frequencies is governed by the supporting area.

    pdf24p nguaconbaynhay11 07-04-2021 19 2   Download

  • The element using hierarchical functions to interpolate the displacements and rotation is efficient, and it is capable to give accurate dynamic responses by small number of the elements. The effects of the moving mass parameters, material distribution, layer thickness ratio and inclined angle on the dynamic behavior of the FGSW beam are examined and highlighted.

    pdf18p nguaconbaynhay11 07-04-2021 13 1   Download

  • This trend has attracted increasing concerns from both academia and industry. This paper addresses how physical layer security can protect secret data compare with the traditional cryptographic encryption and which is the better cooperative relaying scheme with the state of the art approached methods in wireless relaying beamforming network.

    pdf9p vivirginia2711 09-12-2020 14 2   Download

  • Chapter 28 - Security. In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.

    ppt64p nanhankhuoctai10 23-07-2020 22 3   Download

  • The following will be discussed in this chapter: Where we stand on layers, data representation and signaling used, data encoding, reasons for choosing encoding schemes, factors involved, digital data to analog signal (ASK, FSK, PSK), analog data to digital signal.

    ppt62p nanhankhuoctai8 23-06-2020 7 0   Download

  • The effect of the periodic oscillation of the gravitational field, known as g-jitter, on the free convection from a vertical plate is investigated in the present paper. The problem has been simplified by the laminar boundary layer and Boussinesq approximations. The fully implicit finite-difference scheme is used to solve the dimensionless system of the governing equations. The results for laminar flow of air (Pr = 0.72) and water (Pr = 7.00) are presented for different values of the amplitudes and frequencies of the g-jitter.

    pdf11p 12120609 01-06-2020 23 1   Download

  • This paper reviews the main technical solutions adopted by the next-generation mobile broadcasting standard DVB-NGH, the handheld evolution of the second-generation digital terrestrial TV standard DVB-T2.

    pdf12p son248 24-03-2020 20 1   Download

  • The Digital Video Broadcasting Next Generation Handheld (DVB-NGH) standard has adopted many advanced technologies, including overhead reduction schemes, to maximize the system capacity. However, some of the overhead reduction schemes of Layer-l (LI) signaling result in increased initial capture time delays. In order to get a more flexible trade-off between overhead reduction and initial capture time delay, a full-truncated Ll signaling scheme is proposed in DVB-NGH systems. Simulation results demonstrate the effectiveness ofthe proposed scheme.

    pdf5p son248 24-03-2020 14 1   Download

  • Ground improvement technique by prefabricated vertical drain (PVD) in combination with vacuum preloading is widely used to facilitate consolidation process and reduce residual settlement. However, this technique seem hardly be estimated by both analytical method and numerical method because it has complex boundary conditions (such as vacuum pressure changing with time). Moreover, lateral displacements caused by this technique are also significant problem.

    pdf18p chauchaungayxua1 03-12-2019 43 1   Download

  • In this paper, a new strategy of cross layer algorithm is proposed based on the characteristics of reactive routing and multi-hop jumping. In addition, artificial bee colony algorithm is performed to calculate the contention window of the nodes along the routing path over MAC layer

    pdf7p vititan2711 13-08-2019 12 0   Download

  • In this paper the principle operation of a conventional output feedback receding horizon controller based on LQR is presented quickly first and then some opportunities to improve its performance by integrating into intelligent control scheme are discussing.

    pdf12p visumika2711 17-07-2019 6 0   Download

  • The IEEE 802.16 std. includes medium access control (MAC) and physical (PHY) layer specifications and is consider to be a promising technology. Bandwidth reservation is employed to provide quality of service (QoS) to guarantee different services specified in the standard. A bandwidth request/grant scheme is defined in the IEEE 802.16 standard.

    pdf6p girlsseek 27-02-2019 33 0   Download

  • In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.

    ppt41p tangtuy09 26-04-2016 54 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2