Showing 1,621 - 1,640 results of 29,875 for search '"communications"', query time: 0.14s Refine Results
  1. 1621
  2. 1622
  3. 1623

    Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication by Kun Zhang, Kezhen Han, Zhijian Hu, Guoqiang Tan

    Published 2025-01-01
    “…To construct the tracking dynamics under unreliable communication, the AVR's motion is analyzed. To mitigate information leakage and unauthorized access in vehicular network systems, an encrypted guaranteed-cost policy iteration algorithm is developed, incorporating encryption and decryption schemes between the vehicle and the cloud based on the tracking dynamics. …”
    Get full text
    Article
  4. 1624
  5. 1625

    One-time password authentication for one-way communication without re-registration by Qianqian LU, Youwen ZHU, Yan JIANG

    Published 2020-06-01
    “…One-time password is a password that is valid for only one session on a system or device.The existing one-time password scheme without re-registration which is not limited by the number of authentication only supports online authentication,but can not support offline authentication.To solve the above problems,a one-time password authentication scheme for one-way communication without re-registration was proposed.The scheme combined the time-based one-time password scheme with the way of no re-registration.It can realize the offline authentication while satisfying the infinite authentication times and the password time-effective.Finally,the security of the scheme is proved.…”
    Get full text
    Article
  6. 1626
  7. 1627

    Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication by Bo LU, Yueming LU

    Published 2021-09-01
    “…Facing the demand of multi-domain security control in the integrated network of air and ground, to solve the problem that singleprocess regular matching restricts the performance of interconnected security gateway, the method of high-performance optimization of interconnected security control based on semantic security analysis of process communication was proposed.The interaction model of master-slave processes was described in a parallel programming language in the method.The state transition system semantics were given to accurately express the combined semantics of the master-slave processes.The security of master-slave processes in combinatorial semantics was analyzed, which ensured that the parallel running of processes had no deadlock and starvation, and was equivalent to the original regular matching.Experimental results showed that the proposed method could give full play to the advantages of multi-core hardware and reduced the context switching overhead of the scheduler.In the case of complex regular expressions, the method was an order of magnitude better than single-core running.…”
    Get full text
    Article
  8. 1628
  9. 1629

    Performance analysis of the network communication based on AMR speech coding by using NS by JIA Long-tao, BAO Chang-chun

    Published 2006-01-01
    “…Most of the VoIP systems were based on the speech codec with a fixed rate,which maked packet-loss serious,especially for continuous packet-loss.The degradation for the speech quality would be caused by the kind of packet-loss.A network communication system for preventing packet-loss was given.The performance of the system was analyzed by using advanced NS.The simulation results show that the proposed system outperforms traditional IP system over the packet-loss,average delay and subjective listening quality.…”
    Get full text
    Article
  10. 1630

    International Conference. Gesture-Stance-Movement: Communicating Bodies in the Aegean Bronze Age by Marta Pestarino

    Published 2022-03-01
    “…Nei giorni tra l’11 e il 13 novembre 2021 si è tenuto in modalità telematica il convegno dal titolo Gesture-Stance-Movement Communicating Bodies in the Aegean Bronze Age, organizzato da Ute Günkel-Maschek (University of Heidelberg), Céline Murphy (Trinity College Dublin), Fritz Blakolmer (University of Vienna) e Diamantis Panagiotopoulos (University of Heidelberg).…”
    Get full text
    Article
  11. 1631

    Instruction flow mining algorithm based on the temporal sequence of node communication actions by Yingzhuo XIANG, Zhengguo XU, Ling YOU

    Published 2019-09-01
    “…With the situation that the content of the communication between the nodes in the network is unknown,an instruction flow mining algorithm based on the communication sequence was proposed.Firstly,by modelling the relativity of the communication actions and proposing the node communication actions model,the background communication and instruction communication actions was modelled.Moreover,FlowMine algorithm was proposed to solve such models and the convergence of the algorithm was analyzed.The algorithm estimated parameters by sampling and iteration which obtained a near optimal solution.Finally,the validity of the approach was verified by synthetic data and empirical data analysis.Experiment results show the convergence and reliable performance of FlowMine algorithm.…”
    Get full text
    Article
  12. 1632
  13. 1633
  14. 1634
  15. 1635
  16. 1636
  17. 1637
  18. 1638

    Vector Rayleigh Diffraction of High-Power Laser Diode Beam in Optical Communication by Qiang Xu, Renxian Li, Yuanyuan Zhang, Yiping Han, Zhensen Wu

    Published 2020-01-01
    “…Laser diodes (LDs) are widely used in optical wireless communication (OWC) and optical networks, and proper theoretical models are needed to precisely describe the complicated beam field of LDs. …”
    Get full text
    Article
  19. 1639
  20. 1640

    Intelligent information systems for power grid fault analysis by computer communication technology by Ronglong Xu, Jing Zhang

    Published 2025-01-01
    “…To this end, an intelligent information system for power grid fault analysis, leveraging improved computer communication technology, is proposed and developed. …”
    Get full text
    Article