نتایج جستجو برای: hybrid schemes
تعداد نتایج: 289827 فیلتر نتایج به سال:
For deployed wireless sensor networks, reprogramming sensor nodes through the wireless channel is an important capability. To avoid reprogramming false or viral code images, it is important to make sure that each sensor node can securely receive its code image through the wireless channel. Public key schemes based on elliptic curve cryptography are feasible in wireless sensor networks, yet are ...
In this paper, the optimal design of supplementary controller parameters of a unified powerflow controller(UPFC) for damping low-frequency oscillations in a weakly connected systemis investigated. The individual design of the UPFC controller, using hybrid particle swarmoptimization and gravitational search algorithm (PSOGSA)technique under 3 loadingoperating conditions, is discussed. The effect...
We provide a rigorous derivation of a class of double-hybrid approximations, combining Hartree-Fock exchange and second-order Møller-Plesset correlation with a semilocal exchange-correlation density functional. These double-hybrid approximations contain only one empirical parameter and use a density-scaled correlation energy functional. Neglecting density scaling leads to a one-parameter versio...
Recent advancement in wireless networks and systems has seen the rise of localization techniques as a worthwhile and cost-effective basis for novel services. These location based services (LBSs) have been more and more beneficial and money-making for telecommunications operators and companies. Various LBSs can be offered to the user such as tracking, advertisement, security, and management. Wir...
The emergence of mobile/nomadic computing environment , which has been made possible by the maturity of wireless networking technologies and the popularity of small, light, economic hand-held laptops, palmtops, and PDAs, has provided a new way of conducting computation. Incorporating mobile components into a distributed system has posed new challenges to the design of distributed computation. T...
Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid sing...
In this paper, we describe a novel routing mechanism to create a low power, high-bandwidth Wireless Video Sensor Network (WVSN) for miniature distributed robots in urban search and rescue (USAR) applications. WVSN features: 1) high-bandwidth, highquality lossless images, 2) low power, and 3) low latency of data traffic. Traditional proactive network routing schemes exhibit low latency but are i...
Problem statement: Hybrid Optical Code-Division Multiple-Access (OCDMA) and Wavelength-Division Multiplexing (WDM) have flourished as successful schemes for expanding the transmission capacity as well as enhancing the security for OCDMA. However, a comprehensive review related to this hybrid system are lacking currently. Approach: The purpose of this paper is to review the literature on OCDMA-W...
This paper employs the Input-to-State Stability (ISS) framework to investigate the robustness of discrete-time Piece-Wise Affine (PWA) systems in closed-loop with Model Predictive Controllers (MPC), or hybrid MPC for short. We show via an example taken from literature that stabilizing hybrid MPC can generate MPC values functions that are not ISS Lyapunov functions for arbitrarily small additive...
Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridging between them with commitments to some of their inputs and outputs. Unfortunately, the known universally composable (UC) functionalities for commitments and the cryptographic primitives mentione...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید