咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 2 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 生物学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 18 篇 mac algorithm
  • 2 篇 faxed document i...
  • 2 篇 digital camera
  • 2 篇 slot assignment
  • 2 篇 hash-chain
  • 2 篇 wireless sensor ...
  • 2 篇 ad hoc network
  • 2 篇 text integrity v...
  • 2 篇 access protocols
  • 2 篇 privacy
  • 2 篇 broadcast
  • 1 篇 limiting streaml...
  • 1 篇 rst (rotation
  • 1 篇 temperature sens...
  • 1 篇 casson viscoelas...
  • 1 篇 rst (rotation, s...
  • 1 篇 data security
  • 1 篇 robot
  • 1 篇 fluid flow and h...
  • 1 篇 ieee1609

机构

  • 2 篇 natl telecommun ...
  • 1 篇 vellore inst tec...
  • 1 篇 department of ma...
  • 1 篇 indian inst tech...
  • 1 篇 chungbuk natl un...
  • 1 篇 univ toronto dep...
  • 1 篇 katholieke univ ...
  • 1 篇 chungbuk natl un...
  • 1 篇 shenzhen city ke...
  • 1 篇 king mongkuts un...
  • 1 篇 ibm haifa res la...
  • 1 篇 samsung telecom ...
  • 1 篇 cent south univ ...
  • 1 篇 multimedia commu...
  • 1 篇 technion israel ...
  • 1 篇 viettel res & de...
  • 1 篇 indian inst tech...
  • 1 篇 eri giza 12622
  • 1 篇 elect res inst e...
  • 1 篇 le quy don tech ...

作者

  • 2 篇 tiwari shaligram
  • 2 篇 hakeem shimaa a....
  • 2 篇 kim hyungwon
  • 2 篇 patil pratish p.
  • 2 篇 abd el-gawad moh...
  • 1 篇 lindenbaum m
  • 1 篇 pramoun thitipor...
  • 1 篇 liu anfeng
  • 1 篇 lotfinezhad m
  • 1 篇 gu shen
  • 1 篇 knudsen lr
  • 1 篇 xuan-thiep nguye...
  • 1 篇 xu jialong
  • 1 篇 chen chen
  • 1 篇 hui yu
  • 1 篇 song jian
  • 1 篇 gan xiaoying
  • 1 篇 jian song
  • 1 篇 preneel b
  • 1 篇 thumrongrat amor...

语言

  • 17 篇 英文
  • 1 篇 其他
检索条件"主题词=MAC algorithm"
18 条 记 录,以下是1-10 订阅
排序:
A novel broadcasting mac algorithm for ad hoc networks  8th
A novel broadcasting MAC algorithm for ad hoc networks
收藏 引用
8th International Conference on Advances in Information Technology (IAIT)
作者: Liang, Chen Zhang, Yu Song, Jian Tsinghua Univ Dept Elect Engn Tsinghua Natl Lab Informat Sci & Technol TNList Beijing 100084 Peoples R China Sci & Technol Informat Transmiss & Disseminat Com Shenzhen 518057 Peoples R China Shenzhen City Key Lab Digital TV Syst Shenzhen 518057 Peoples R China
Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm whic... 详细信息
来源: 评论
A novel broadcasting mac algorithm for ad hoc networks
收藏 引用
Procedia Computer Science 2017年 111卷 268-276页
作者: Chen Liang Yu Zhang Jian Song Tsinghua National Laboratory for Information Science and Technology (TNList) Tsinghua University Department of Electronics Engineering Tsinghua University Beijing 100084 China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shenzhen City Key Laboratory of Digital TV System Shenzhen 518057 China
Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm whic... 详细信息
来源: 评论
NUMERICAL STUDY OF FREE CONVECTION Ag-WATER NANOFLUID FLOW IN A SQUARE ENCLOSURE WITH VISCOUS DISSIPATION AND HEAT GENERATION/ABSORPTION EFFECTS IN A POROUS MEDIUM WITH COMPLEX WALL CONDITIONS
收藏 引用
JOURNAL OF POROUS MEDIA 2023年 第9期26卷 77-99页
作者: Vinodhini, Nithiyanandam Prasad, Vallampati Ramachandra Vellore Inst Technol Sch Adv Sci Dept Math Vellore 632014 India
Nanofluids hold great promise in improving transport processes in energy systems including hybrid fuel cells. In this present work, a mathematical model is developed for laminar free convection flow of Ag-water nano-a... 详细信息
来源: 评论
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
收藏 引用
SENSORS 2020年 第19期20卷 5719.-5719.页
作者: Hakeem, Shimaa A. Abdel Abd El-Gawad, Mohamed A. Kim, HyungWon Chungbuk Natl Univ Sch Elect Engn Cheongju 28644 South Korea Elect Res Inst ERI Giza 12622 Egypt Korea Univ Sch Elect Engn Seoul 02841 South Korea Natl Telecommun Inst Cairo 11768 Egypt
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X... 详细信息
来源: 评论
A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks
收藏 引用
IEEE ACCESS 2019年 7卷 119689-119705页
作者: Hakeem, Shimaa A. Abdel Abd El-Gawad, Mohamed A. Kim, Hyungwon Chungbuk Natl Univ Elect Engn Dept Cheongju 28644 South Korea ERI Giza 12622 Egypt Natl Telecommun Inst Cairo 11768 Egypt
Recently many security protocols have been proposed for road safety applications in Vehicle-to-everything (V2X) communications. Most of them, however, do not fully satisfy the requirements of light-weight and fast pro... 详细信息
来源: 评论
Influence of external magnetic wire on natural convection of non-Newtonian fluid in a square cavity
收藏 引用
Partial Differential Equations in Applied Mathematics 2021年 4卷
作者: Sarala Devi, T. Venkata Lakshmi, C. Venkatadri, K. Suryanarayana Reddy, M. Department of Applied Mathematics Sri Padmavathi Mahila Visvavidyalayam AP Tirupati 517502 India Department of Mathematics Sreenivasa Institute of Technology and Management Studies Chittoor 517127 India Department of Mathematics JNTUA College of Engineering Pulivendula India
The augment of heat transfer and intensity of fluid has wide range of application in science and engineering. The buoyancy-driven flow of Casson viscoelastic fluid in a square cavity in the presence of external magnet... 详细信息
来源: 评论
An Energy-Efficient Smart Monitoring System Using ZigBee Wireless Sensor Network  4
An Energy-Efficient Smart Monitoring System Using ZigBee Wir...
收藏 引用
4th National-Foundation-for-Science-and-Technology-Development (NAFOSTED) Conference on Information and Computer Science (NICS)
作者: Van-Lan Dao Xuan-Thiep Nguyen Van-Phuc Hoang Le Quy Don Tech Univ 236 Hoang Quoc Viet Str Hanoi Vietnam Viettel Res & Dev Inst Hanoi Vietnam
In this paper, we present the design of an energy-saving wireless sensor network using ZigBee standard with tree network topology and the frequency band of 2.4 GHz. By choosing low power consumption components, modify... 详细信息
来源: 评论
The Study on the Increasing Strategy of Detecting Moving Target in Wireless Sensor Networks
The Study on the Increasing Strategy of Detecting Moving Tar...
收藏 引用
14th International Conference on algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Xu, Jialong Chen, Zhigang Liu, Anfeng Song, Hong Cent South Univ Sch Software Changsha Hunan Peoples R China Cent South Univ Sch Informat Sci & Engn Changsha Peoples R China
Wireless Sensor Networks (WSNs) have promising and valuable applications. More and more researchers have conducted research in this area. Because sensor nodes are small and cheap, they usually use battery to provide e... 详细信息
来源: 评论
COMPUTATION OF FLOW PAST COMPLEX GEOMETRIES USING mac algorithm ON BODY-FITTED COORDINATES
收藏 引用
ENGINEERING APPLICATIONS OF COMPUTATIONAL FLUID MECHANICS 2009年 第1期3卷 15-27页
作者: Patil, Pratish P. Tiwari, Shaligram Indian Inst Technol Dept Mech Engn Madras 600036 Tamil Nadu India
The study aims to report an algorithm based on co-ordinate transformation to compute complex flows. A two-dimensional computational code is developed using transformation of governing incompressible flow equations by ... 详细信息
来源: 评论
Text Integrity Verification for Faxed Document Using Pixel Reorganizing Technique
Text Integrity Verification for Faxed Document Using Pixel R...
收藏 引用
10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)
作者: Pramoun, Thitiporn Amornraksa, Thumrongrat King Mongkuts Univ Technol Fac Engn Dept Comp Engn Multimedia Commun Lab Bangkok 10140 Thailand
since text in faxed document can be altered by malicious person who can get the faxed document directly from fax machine without permission from the real recipient, the method of text integrity verification for faxed ... 详细信息
来源: 评论