过去一年中添加的文章,按日期排序

OSI Network Layers Based Secured Data Sharins in Cloud Computing Using STXORSK-QC and Dhdecct-MAC

CS TIWARI, VK JHA - 2024 - researchsquare.com
18 天前 - … Primarily, the data owner registers in the Application Layer and logs in to access
the … , data link layer, network layer, and physical layer of the OSI network are concentrated. ➢ …

Реализация протокола обмена данных TCP/IP с микроконтроллером STM32: выпускная квалификационная работа бакалавра: направление 11.03. 02 « …

Ч Луян - 2024 - elib.spbstu.ru
21 天前 - … By implementing the physical layer, data link layer, and network layer, as well as
programming the TCP/IP protocol stack, we ensure proper encapsulation, decapsulation, and …

6G communication systems: concept, trends, physical level technologies

DA Pokamestov, YV Kryukov… - Radiotehnika i …, 2024 - journals.rcsi.science
27 天前 - … The emphasis is on physical layer technologies, since they are … Application of the
scattering operator and interaction … Possible areas of application of the method are discussed…

Comparative Analysis of Processing Latency and CPU Efficiency in FPGA-Based FEC Acceleration

A Tuerxun, A Nakao - … International Conference on Network …, 2024 - ieeexplore.ieee.org
43 天前 - … This dynamic routing not only minimizes data transmission latency but also
facilitates the independent implementation and testing of various physical layer functions. This …

Design of Intelligent City Communication Network Based on Internet of Things

Y Ma, Y Peng - Applied Mathematics and Nonlinear Sciences, 2024 - sciendo.com
44 天前 - … ) error-checking code is implemented to ensure the accuracy of network transmissions.
network model is designed using OFDM algorithms to divide the physical layer of the …

[PDF][PDF] Design and Implementation of Secure CP-Less Multi-User OCDM Transceiver for 6G Wireless Communication Networks

KS NISAR, SE ULLAH, F JABIN - 2024 - researchgate.net
48 天前 - … ABSTRACT In this paper, we designed and implemented a multi-antenna configured
… system-based encryption algorithm to enhance physical layer security (PLS). In addition, …

Improving ATSC 3.0 Channel Estimation using AI Techniques

E Iradier, I Bilbao, J Montalban… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
48 天前 - … of a core network, has proposed ATSC 3.0 as a strong candidate for implementing
new … A set of ATSC 3.0 physical layer configurations cannot be implemented with the current …

A New Security and Identification Concept for SWIPT Systems in IoT Applications

TE Djidjekh, L Sanogo, G Loubet… - 2024 IEEE/MTT-S …, 2024 - ieeexplore.ieee.org
51 天前 - … Backscattering techniques are intensively used mainly for RFID application, sensing
and communication [5] but not for implementing a security mechanism at physical layer. A …

[PDF][PDF] TECHNIQUES FOR MITIGATING EVIL TWIN ATTACKS IN 802.11 NETWORKS

AK MISHRA - fuzzy-tversu.com
53 天前 - … used network diagnostic tool traceroute. A passive ETA detection scheme is proposed
[11] by using channel state information in physical layer. … The implement and evaluate the …

Linguistic Encryption for Underwater Communication

O Blanchette, G Calderon, A Hamby… - 2024 13th …, 2024 - ieeexplore.ieee.org
56 天前 - networks use a variety of tactics to secure communication which can generally be
characterized as either traditional cryptography or physical layer … Pona can implement any set …