Showing 1 - 18 results of 18 for search 'Skenderaj~', query time: 3.33s Refine Results
  1. 1

    TECHNOLOGy AND NAQSHBANDI SUFISM: AN EMPIRICAL ANALYSIS OF ISMAIL AGA AND iSKENDER PAŞA BRANCHES by Himmet HÜLÜR

    Published 2016-02-01
    “…<p>ATECHNOLOGy AND NAQSHBANDI SUFISM: AN EMPIRICAL ANALYSIS OF ISMAIL AGA AND iSKENDER PAŞA BRANCHES</p>…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Optimization of multipath transmission path scheduling based on forward delay in vehicular heterogeneous network by Haitao ZHAO, Yue CHEN, Tangwei ZHANG, Qixing ZHU, Hongbo ZHU

    Published 2020-11-01
    “…In order to solve the problem that the data packets were out of order at the receiving end in the multipath transmission,which greatly reduced the transmission performance,an optimization algorithm was proposed for multipath transmission path scheduling based on forward delay in the vehicle heterogeneous network.The main idea of the proposed algorithm was to schedule data packets through a concurrent path according to the forward delay and throughput difference estimated by the sender.A simulation experiment was carried out on NS-3.The simulation results show that compared with the previous algorithm,the proposed algorithm has better performance than other algorithms in reorder-buffer-occupancy density (RBD) and throughput.The problem of out-of-order data packets at the receiving end is significantly reduced,and the total system throughput and network utilization have been improved.…”
    Get full text
    Article
  17. 17

    Quantum public-key encryption protocol based on single-photon by Wen-jun LUO, Guan-li LIU

    Published 2014-11-01
    “…A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the method of block classification to lower the requirement for storage capacity of the sender.A new quantum source as transmission carrier was introduced and simply encoding and decoding rules were designed based on the laws of quantum non-cloning and ciphertext indistinguishability.On the other hand,classical one-time pad technique is used to ensure the security of quantum key and plaintext in the transmission channel.At the same time,select different updating strategy of quantum public-key according to the results of error detection which can significantly reduce key consumption.Compared with the previous quantum public-key encryption based on entangled states and single-photon,there are no entangled states and decoyed particles are needed,so it is not only efficient to reduce the overhead of communication traffic between legitimate users,but also easier to carry out in practice.The analysis shows that the proposed scheme is secure.…”
    Get full text
    Article
  18. 18