9   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Kazuki Nakamura, Koji Hori and Shoichi Hirose    
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jacopo Beretta, Andres Cardozo, Nicola Paletta, Antonio Chiariello and Marika Belardo    
The T-WING project, a CS2-CPW (Clean Sky 2 call for core partner waves) research initiative within FRC IADP (Fast Rotor-Craft Innovative Aircraft Demonstrator Platform), focuses on developing, qualifying and testing the new wing of the Next-Generation Ci... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Wei Yue, Wenbin Tang and Liyuan Wang    
In order to enhance the anti-submarine capability of multi-unmanned aerial vehicles (multi-UAVs) in the unknown sea environment and improve the search efficiency, in this paper, we propose a rule-inspired-multi-ant colony (RI-MAC)-based UAV cooperative s... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Huajin Shao, Yanfei Zuo and Zhinong Jiang    
A method for dynamic finite element (FE) model updating based on correlated mode auto-pairing and adaptive evolution screening (CMPES) is proposed to overcome difficulties in pairing inaccurate analytical modal data and incomplete experimental modal data... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bahaa Kareem Mohammed,Saif ali alsaidi,Raad Farhood Chisab,Haider Alrikabi     Pág. pp. 204 - 211
It is a well-known fact that the forthcoming names are distinctively different: interference range, career sense, and transmission. The given paper reveals the underlying study of disengagement of a request to send (RTS)/ clear to send (CTS) dialog. It w... ver más

 
en línea
Jan Sykora    
This paper focuses on the channel state estimation (CSE) problem in parametrized Hierarchical MAC (H-MAC) stage in Wireless Physical Layer Network Coding (WPNC) networks with Hierarchical Decode and Forward (HDF) relay strategy. We derive a non-pilot bas... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nermin Makhlouf,Pavel Vajsar     Pág. 9 - 12
Mobile Ad hoc NETwork (MANET) is a wireless net- work of mobile nodes connected by wireless link without a central control. The Medium Access Control (MAC) protocol is one of the important issues in such network, thereby the presented paper will discuss ... ver más

 
en línea
Meriem Houmer,Mariya Ouaissa,Mariyam Ouaissa,Moulay Lahcen Hasnaoui     Pág. pp. 48 - 64
In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency. Nevertheless, due to its special characteristics like high mobility, large size of the network and dynamic t... ver más

 
en línea
Jianjun Lei, Ying Wang and Hong Yun    
Legacy IEEE 802.11 Medium Access Control (MAC) adopts the Distributed Coordination Function (DCF) mechanism, which provides the same access opportunity for all contenders. However, in dense multi-rate Wireless Local Area Networks (WLANs), the pure distri... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »