咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 2 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 生物学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 18 篇 mac algorithm
  • 2 篇 faxed document i...
  • 2 篇 digital camera
  • 2 篇 slot assignment
  • 2 篇 hash-chain
  • 2 篇 wireless sensor ...
  • 2 篇 ad hoc network
  • 2 篇 text integrity v...
  • 2 篇 access protocols
  • 2 篇 privacy
  • 2 篇 broadcast
  • 1 篇 limiting streaml...
  • 1 篇 rst (rotation
  • 1 篇 temperature sens...
  • 1 篇 casson viscoelas...
  • 1 篇 rst (rotation, s...
  • 1 篇 data security
  • 1 篇 robot
  • 1 篇 fluid flow and h...
  • 1 篇 ieee1609

机构

  • 2 篇 natl telecommun ...
  • 1 篇 vellore inst tec...
  • 1 篇 department of ma...
  • 1 篇 indian inst tech...
  • 1 篇 chungbuk natl un...
  • 1 篇 univ toronto dep...
  • 1 篇 katholieke univ ...
  • 1 篇 chungbuk natl un...
  • 1 篇 shenzhen city ke...
  • 1 篇 king mongkuts un...
  • 1 篇 ibm haifa res la...
  • 1 篇 samsung telecom ...
  • 1 篇 cent south univ ...
  • 1 篇 multimedia commu...
  • 1 篇 technion israel ...
  • 1 篇 viettel res & de...
  • 1 篇 indian inst tech...
  • 1 篇 eri giza 12622
  • 1 篇 elect res inst e...
  • 1 篇 le quy don tech ...

作者

  • 2 篇 tiwari shaligram
  • 2 篇 hakeem shimaa a....
  • 2 篇 kim hyungwon
  • 2 篇 patil pratish p.
  • 2 篇 abd el-gawad moh...
  • 1 篇 lindenbaum m
  • 1 篇 pramoun thitipor...
  • 1 篇 liu anfeng
  • 1 篇 lotfinezhad m
  • 1 篇 gu shen
  • 1 篇 knudsen lr
  • 1 篇 xuan-thiep nguye...
  • 1 篇 xu jialong
  • 1 篇 chen chen
  • 1 篇 hui yu
  • 1 篇 song jian
  • 1 篇 gan xiaoying
  • 1 篇 jian song
  • 1 篇 preneel b
  • 1 篇 thumrongrat amor...

语言

  • 17 篇 英文
  • 1 篇 其他
检索条件"主题词=MAC algorithm"
18 条 记 录,以下是1-10 订阅
排序:
macDES: mac algorithm based on DES
收藏 引用
ELECTRONICS LETTERS 1998年 第9期34卷 871-873页
作者: Knudsen, LR Preneel, B Univ Bergen Dept Informat N-5020 Bergen Norway Katholieke Univ Leuven Dept Elect Engn ESAT COSIC B-3001 Heverlee Belgium
A new message authentication code (mac) algorithm is proposed, which improves the popular retail mac based on the data encryption standard;it has the same complexity, but provides better resistance against key recover... 详细信息
来源: 评论
COMPUTATION OF FLOW PAST COMPLEX GEOMETRIES USING mac algorithm ON BODY-FITTED COORDINATES
收藏 引用
ENGINEERING APPLICATIONS OF COMPUTATIONAL FLUID MECHANICS 2009年 第1期3卷 15-27页
作者: Patil, Pratish P. Tiwari, Shaligram Indian Inst Technol Dept Mech Engn Madras 600036 Tamil Nadu India
The study aims to report an algorithm based on co-ordinate transformation to compute complex flows. A two-dimensional computational code is developed using transformation of governing incompressible flow equations by ... 详细信息
来源: 评论
A novel broadcasting mac algorithm for ad hoc networks  8th
A novel broadcasting MAC algorithm for ad hoc networks
收藏 引用
8th International Conference on Advances in Information Technology (IAIT)
作者: Liang, Chen Zhang, Yu Song, Jian Tsinghua Univ Dept Elect Engn Tsinghua Natl Lab Informat Sci & Technol TNList Beijing 100084 Peoples R China Sci & Technol Informat Transmiss & Disseminat Com Shenzhen 518057 Peoples R China Shenzhen City Key Lab Digital TV Syst Shenzhen 518057 Peoples R China
Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm whic... 详细信息
来源: 评论
A novel broadcasting mac algorithm for ad hoc networks
收藏 引用
Procedia Computer Science 2017年 111卷 268-276页
作者: Chen Liang Yu Zhang Jian Song Tsinghua National Laboratory for Information Science and Technology (TNList) Tsinghua University Department of Electronics Engineering Tsinghua University Beijing 100084 China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shenzhen City Key Laboratory of Digital TV System Shenzhen 518057 China
Wireless ad hoc networks with broadcasting are widely applied in IoT and emergency situations as the network can be set up without traditional infrastructures. In this paper, we propose a TDMA-based mac algorithm whic... 详细信息
来源: 评论
mac versus PC: Determinism and randomness as complementary approaches to robotic exploration of continuous unknown domains
收藏 引用
INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH 2000年 第1期19卷 12-31页
作者: Wagner, IA Lindenbaum, M Bruckstein, AM IBM Haifa Res Lab IL-31905 Haifa Israel Technion Israel Inst Technol Dept Comp Sci IL-32000 Haifa Israel
Three methods are described for exploring a continuous unknown planar region by a group of robots having limited sensors and no explicit communication. We formalize the problem, prove that its off-line version is NP-h... 详细信息
来源: 评论
A Real Time Testbed for the Evaluation of Cognitive Radio mac
A Real Time Testbed for the Evaluation of Cognitive Radio MA...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 2010)
作者: Gu, Shen Xu, Pengchao Wang, Xinbing Gan, Xiaoying Yu, Hui Shanghai Jiao Tong Univ Dept Elect Engn Shanghai Peoples R China
Cognitive Radio is a promising technology to solve the problem of increasing spectrum shortage in wireless communication. It allows secondary users(SUs) to opportunistically access idle spectrum of primary users(PUs) ... 详细信息
来源: 评论
Three-dimensional numerical investigations on flow and heat transfer for flow past a channel confined square cylinder
收藏 引用
PROGRESS IN COMPUTATIONAL FLUID DYNAMICS 2010年 第3期10卷 146-156页
作者: Patil, Pratish P. Tiwari, Shaligram Indian Inst Technol Madras Dept Mech Engn Chennai 600036 Tamil Nadu India
Present work investigates three-dimensional fluid flow and heat transfer for flow past a square cylinder built-in a rectangular channel. The governing equations for viscous fluid flow and heat transfer are solved nume... 详细信息
来源: 评论
A Decentralized Lightweight Authentication and Privacy Protocol for Vehicular Networks
收藏 引用
IEEE ACCESS 2019年 7卷 119689-119705页
作者: Hakeem, Shimaa A. Abdel Abd El-Gawad, Mohamed A. Kim, Hyungwon Chungbuk Natl Univ Elect Engn Dept Cheongju 28644 South Korea ERI Giza 12622 Egypt Natl Telecommun Inst Cairo 11768 Egypt
Recently many security protocols have been proposed for road safety applications in Vehicle-to-everything (V2X) communications. Most of them, however, do not fully satisfy the requirements of light-weight and fast pro... 详细信息
来源: 评论
NUMERICAL STUDY OF FREE CONVECTION Ag-WATER NANOFLUID FLOW IN A SQUARE ENCLOSURE WITH VISCOUS DISSIPATION AND HEAT GENERATION/ABSORPTION EFFECTS IN A POROUS MEDIUM WITH COMPLEX WALL CONDITIONS
收藏 引用
JOURNAL OF POROUS MEDIA 2023年 第9期26卷 77-99页
作者: Vinodhini, Nithiyanandam Prasad, Vallampati Ramachandra Vellore Inst Technol Sch Adv Sci Dept Math Vellore 632014 India
Nanofluids hold great promise in improving transport processes in energy systems including hybrid fuel cells. In this present work, a mathematical model is developed for laminar free convection flow of Ag-water nano-a... 详细信息
来源: 评论
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
收藏 引用
SENSORS 2020年 第19期20卷 5719.-5719.页
作者: Hakeem, Shimaa A. Abdel Abd El-Gawad, Mohamed A. Kim, HyungWon Chungbuk Natl Univ Sch Elect Engn Cheongju 28644 South Korea Elect Res Inst ERI Giza 12622 Egypt Korea Univ Sch Elect Engn Seoul 02841 South Korea Natl Telecommun Inst Cairo 11768 Egypt
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X... 详细信息
来源: 评论