نتایج جستجو برای: hybrid schemes

تعداد نتایج: 289827  

2015
Jing Deng Richard Han Shivakant Mishra

For deployed wireless sensor networks, reprogramming sensor nodes through the wireless channel is an important capability. To avoid reprogramming false or viral code images, it is important to make sure that each sensor node can securely receive its code image through the wireless channel. Public key schemes based on elliptic curve cryptography are feasible in wireless sensor networks, yet are ...

In this paper, the optimal design of supplementary controller parameters of a unified powerflow controller(UPFC) for damping low-frequency oscillations in a weakly connected systemis investigated. The individual design of the UPFC controller, using hybrid particle swarmoptimization and gravitational search algorithm (PSOGSA)technique under 3 loadingoperating conditions, is discussed. The effect...

Journal: :The Journal of chemical physics 2011
Kamal Sharkas Julien Toulouse Andreas Savin

We provide a rigorous derivation of a class of double-hybrid approximations, combining Hartree-Fock exchange and second-order Møller-Plesset correlation with a semilocal exchange-correlation density functional. These double-hybrid approximations contain only one empirical parameter and use a density-scaled correlation energy functional. Neglecting density scaling leads to a one-parameter versio...

2010
Mohamed Laaraiedh

Recent advancement in wireless networks and systems has seen the rise of localization techniques as a worthwhile and cost-effective basis for novel services. These location based services (LBSs) have been more and more beneficial and money-making for telecommunications operators and companies. Various LBSs can be offered to the user such as tracking, advertisement, security, and management. Wir...

1998
Yu-Chee Tseng Cheng-Chung Tan

The emergence of mobile/nomadic computing environment , which has been made possible by the maturity of wireless networking technologies and the popularity of small, light, economic hand-held laptops, palmtops, and PDAs, has provided a new way of conducting computation. Incorporating mobile components into a distributed system has posed new challenges to the design of distributed computation. T...

2014
Ming Hour Yang

Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid sing...

2006
Jaewook Bae Richard M. Voyles

In this paper, we describe a novel routing mechanism to create a low power, high-bandwidth Wireless Video Sensor Network (WVSN) for miniature distributed robots in urban search and rescue (USAR) applications. WVSN features: 1) high-bandwidth, highquality lossless images, 2) low power, and 3) low latency of data traffic. Traditional proactive network routing schemes exhibit low latency but are i...

2012
Isaac A.M. Ashour Sahbudin Shaari P. Susthitha Hesham A. Bakarman

Problem statement: Hybrid Optical Code-Division Multiple-Access (OCDMA) and Wavelength-Division Multiplexing (WDM) have flourished as successful schemes for expanding the transmission capacity as well as enhancing the security for OCDMA. However, a comprehensive review related to this hybrid system are lacking currently. Approach: The purpose of this paper is to review the literature on OCDMA-W...

2006
M. Lazar

This paper employs the Input-to-State Stability (ISS) framework to investigate the robustness of discrete-time Piece-Wise Affine (PWA) systems in closed-loop with Model Predictive Controllers (MPC), or hybrid MPC for short. We show via an example taken from literature that stabilizing hybrid MPC can generate MPC values functions that are not ISS Lyapunov functions for arbitrarily small additive...

Journal: :IACR Cryptology ePrint Archive 2016
Jan Camenisch Maria Dubovitskaya Alfredo Rial

Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridging between them with commitments to some of their inputs and outputs. Unfortunately, the known universally composable (UC) functionalities for commitments and the cryptographic primitives mentione...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید