Academic literature on the topic 'Multi-Layer communications'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-Layer communications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multi-Layer communications":

1

Iqbal, Farabi, Jeroen van der Ham, and Fernando Kuipers. "Technology-aware multi-domain multi-layer routing." Computer Communications 62 (May 2015): 85–96. http://dx.doi.org/10.1016/j.comcom.2015.01.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dosti Kh. Abbas, Dosti Kh Abbas, Tarik A. Rashid Dosti Kh. Abbas, Karmand H. Abdalla Tarik A. Rashid, Nebojsa Bacanin Karmand H. Abdalla, and Abeer Alsadoon Nebojsa Bacanin. "Using Fitness Dependent Optimizer for Training Multi-layer Perceptron." 網際網路技術學刊 22, no. 7 (December 2021): 1575–85. http://dx.doi.org/10.53106/160792642021122207011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bogucka, Hanna, and Oliver Holland. "Multi-Layer Approach to Future Green Mobile Communications." IEEE Intelligent Transportation Systems Magazine 5, no. 4 (2013): 28–37. http://dx.doi.org/10.1109/mits.2013.2263461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khorshid, Ahmed E., Ibrahim N. Alquaydheb, Ahmed M. Eltawil, and Fadi J. Kurdahi. "Physical Multi-Layer Phantoms for Intra-Body Communications." IEEE Access 6 (2018): 42812–21. http://dx.doi.org/10.1109/access.2018.2849709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

CLARK, KEITH, PETER J. ROBINSON, and RICHARD HAGEN. "Multi-threading and message communication in Qu-Prolog." Theory and Practice of Logic Programming 1, no. 3 (May 2001): 283–301. http://dx.doi.org/10.1017/s147106840100120x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper presents the multi-threading and internet message communication capabilities of Qu-Prolog. Message addresses are symbolic and the communications package provides high-level support that completely hides details of IP addresses and port numbers as well as the underlying TCP/IP transport layer. The combination of the multi-threads and the high level inter-thread message communications provide simple, powerful support for implementing internet distributed intelligent applications.
6

Khan, Usman Ali, and Sang Sun Lee. "Multi-Layer Problems and Solutions in VANETs: A Review." Electronics 8, no. 2 (February 11, 2019): 204. http://dx.doi.org/10.3390/electronics8020204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Dedicated Short Range Communication (DSRC) technology supports the vehicular communications through Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) Communication, by operating at 5.9 GHz band (U.S. Standard). The Physical (PHY) and Medium Access Control (MAC) Layer are defined by the IEEE 802.11p, while the IEEE 1609 family of standards define the Wireless Access in Vehicular Environment (WAVE); a suite of communication and security standards in the Vehicular Area Networks (VANETs). There has been a lot of research regarding several challenges in VANETs, from spectrum utilization to multichannel operation and from routing to security issues. The aim of all is to improve the performance of the network and support scalability in VANETs; which is defined as the ability of the network to handle the addition of vehicles (nodes) without suffering noticeable degradation of performance or administrative overhead. In this paper, we aim to highlight multilayer challenges concerning the performance of the VANETs, the already proposed solutions, and the possible future work.
7

Wang, Yuefeng, and Ibrahim Matta. "Multi-layer Virtual Transport Network management." Computer Communications 130 (October 2018): 38–49. http://dx.doi.org/10.1016/j.comcom.2018.08.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuipers, Fernando, and Freek Dijkstra. "Path selection in multi-layer networks." Computer Communications 32, no. 1 (January 2009): 78–85. http://dx.doi.org/10.1016/j.comcom.2008.09.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Diaz, Sergio, Diego Mendez, and Rolf Kraemer. "A Multi-Layer Self-Healing Algorithm for WSNs." Journal of Circuits, Systems and Computers 29, no. 05 (July 3, 2019): 2050070. http://dx.doi.org/10.1142/s021812662050070x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The implementation of Wireless Sensor Networks (WSNs) is a challenging task due to their intrinsic characteristics, e.g., energy limitations and unreliable wireless links. Considering this, we have developed the Disjoint path And Clustering Algorithm (DACA) that combines topology control and self-healing mechanisms to increase the network lifetime with minimum loss of coverage. Initially, DACA constructs a tree that includes all nodes of the network by using the Collection Tree Protocol (CTP). This tree is an initial communication backbone through which DACA centralizes the information. Then, DACA builds a set of spatial clusters using Kmeans and selects the Cluster Heads (CHs) using Particle Swarm Optimization (PSO) and a multi-objective optimization (MOO) function. Subsequently, DACA reconstructs the tree using only the CHs. In this way, DACA reduces the number of active nodes in the network and saves energy. Finally, DACA finds disjoint paths on the reconstructed tree by executing the N-to-1 multipath discovery protocol. By doing so, the network can overcome communications failures with a low control message overhead. The simulations on Castalia show that DACA considerably extends the network lifetime by having a set of inactive nodes and disjoint paths that support the communication when active nodes die. Besides, DACA still maintains a good coverage of the area of interest despite the inactive nodes. Additionally, we evaluate the shape of the tree (i.e., the average number of hops) and the risk of connection loss of the network.
10

Chan, Vincent W. S. "Multi-Layer Network Security Architecture." IEEE Communications Magazine 58, no. 12 (December 2020): 4. http://dx.doi.org/10.1109/mcom.2020.9311934.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Multi-Layer communications":

1

Mao, Yinian. "Securing multi-layer communications a signal processing approach /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.
Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
2

Boussemart, Vincent. "Bénéfices de la communication inter-protocoles au niveau applicatif et des ressources pour contrôler les interférences dans les communications satellites." Thesis, Toulouse, ISAE, 2013. http://www.theses.fr/2013ESAE0013/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cette thèse étudie les optimisations d’allocation de ressources dans le lien retour de systèmes satellites à faisceaux multipleslimités par les interférences et pouvant être vus comme des systèmes MIMO virtuels. Cette thèse se focalise sur lesinterférences générées par les utilisateurs positionnés dans différents faisceaux et transmettant en même temps et avec lamême fréquence. Le nombre de fréquences (couleurs) présent dans le système satellite modifie la bande passante et de cefait la capacité du système. Quand ce nombre est réduit, par ex. une seule couleur, le niveau d’interférences augmente maisla bande passante dans chaque faisceau est plus grande. Il y a donc un compromis entre nombre de couleurs et niveaud’interférences. L’influence du canal satellite est tout d’abord évaluée en analysant le taux d’erreur obtenu avec diversestechniques de suppression d’interférences. La thèse s’oriente ensuite vers la théorie de l’information et étudie l’impact dunombre de couleurs sur les débits totaux. La détection multi-utilisateurs est prise en compte pour dériver les débitsutilisateurs et en particulier le critère max-min est appliqué, montrant une amélioration du niveau d’équité. Les différentsrésultats sont utilisés pour optimiser l’allocation des ressources mais l’ordonnancement pour des systèmes MIMO à grandeéchelle représente une tâche difficile, le domaine de recherche étant de taille prohibitive. De ce fait cette thèse étudie aussides algorithmes heuristiques à complexité réduite, basés sur la théorie des graphes, visant à trouver des ordonnancementssous-optimaux. Enfin le nombre de faisceaux et d’utilisateurs pris en compte pour l’ordonnancement sont étudiés pourproposer de nouveaux algorithmes satisfaisant des contraintes de qualité de service
This Ph.D. investigates resource management optimisations in the return-link of interference-limited multi-beam satellitesystems which can be seen as virtual MIMO systems. It focuses on the interference that users located in different beamsgenerate towards each other, when transmitting data at the same time and on the same frequency. The number offrequencies (colours) present in the satellite system rules the overall bandwidth and therefore the system capacity. Whenthe number of colours becomes low, e.g. considering one colour, the level of interference increases dramatically but thebandwidth available in each beam gets higher. Hence there is a tradeoff between number of colours and level ofinterference. The influence of the satellite channel is first studied by analysing the BER obtained through interferencecancellation techniques. The Ph.D. then moves towards information theory and investigates the impact of the colours onthe achievable sum rates. MUD schemes are then used to derive the per-user rates, and the max-min criterion is applied tothe user rates showing an improvement of the level of fairness between users. The different outcomes are used to optimisethe resource management. However, scheduling for large scale MIMO systems, as in the return-links of satellitecommunications, represents a challenging task, since the search space is prohibitive large. For this reason this Ph.D. alsoinvestigates low complexity heuristic algorithms based on graph theory with the aim of finding sub-optimal schedules.Finally, the number of spot beams and the number of users considered for scheduling are studied so as to propose newalgorithms aiming to satisfy quality of service constraints
3

Boviz, Dora. "Communications multi-utilisateurs dans les réseaux d’accès radio centralisés : architecture, coordination et optimisation." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLC035/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Dans les réseaux mobiles du future, un déploiement plus dense des points d’accés radio est prévu pour satisfaire la demande accrue de débit, mais les terminaux utilisateurs peuvent être affectés par une interférence inter-cellulaire plus forte. Par chance, la centralisation des traitements de signal en bande de base dans l’achitecture Cloud RAN (C-RAN) offre la possibilité de la coordination et du traitement conjoint de plusieurs cellules. Pour réellement permettre de déployer ces techniques, une étude bout-à-bout du CRAN est nécessaire selon plusieurs aspects, notamment l’architecture fonctionnelle, la stratégie de coordination, l’implémentation du traitement de signal multiutilisateur et les optimisations possibles pour un fonctionnement plus efficace.Dans cette thèse, nous proposons en premier une architecture qui définit le placement des fonctions du traitement en bande de base entre les unités distribuées et le serveur central. Le but de ce design est de permettre la réalisation des fonctions multi-utilisateurs en transmettant avec la moins de débit possible sur les liens de fronthaul reliant les différentes entités. Dans un second temps, nous présentons comment il est possible de coordiner les différentes cellules servies par le C-RAN en utilisant le concept de réseaux définis par logiciels adapté pour les réseaux d’accès radio. Nous avons mis en place un prototype démontrant la faisabilité de la méthode de contrôle proposée. Finalement, nous étudions l’allocation adaptative du débit sur les liens de fronthaul transportant les symboles numériques quantifiés des utilisateurs en besoin de traitement multi-cellulaire sur la voie montante pour exploiter l’interférence entre eux. Nous proposons un modèle d’optimisation qui inclut le coût des transmissions fronthaul pour maximiser ainsi le gain obtenu par l’opérateur du réseau où la communication multiutilisateur a lieu. Nous réalisons l’optimisation pour différents modèles de coût et en utilisants deux types de données: d’abord les estimations de canal supposées parfaites et disponibles en temps réel, puis seulement les statistiques du canal. Nous montrons que la méthode d’optimisation proposée permet d’exploiter plus efficacement les liens de fronthaul dans l’architecture précedemment définie
In future mobile networks denser deployment of radio access points is planned to satisfy demand of higher throughput, but an increased number of mobile users can suffer from inter-cell interference. Fortunately, the centralization of base-band processing offered by Cloud Radio Access Network (C-RAN) architecture enables coordination and joint physical layer processing between cells. To make practical deployment of these techniques possible, we have to study C-RAN in an end-to-end view regarding several aspects: the functional architecture of a deployment, the multi-cell coordination strategy, the implementation of multi-user signal processing and possibilities for optimization to increase operational efficiency.In this thesis, first, we propose an architecture defining the placement of base-band processing functions between the distributed remote units and the central processing unit. The aim of this design is to enable multi-cell processing both on the uplink and the downlink while requiring low data rate between the involved entities. Secondly, we study how low latency coordination can be realized inside the central unit using software defined networking adapted to radio access networks. Our demonstration through a real-time prototype deployment shows the feasibility of the proposed control framework. Finally, we investigate adaptive allocation of fronthaul rate that is used for transferring quantized base-band symbols for users participating in uplink multi-cell reception in order to exploit interference between them. We propose an optimization model that includes the cost of fronthaul tranmissions and aims to maximize the gain of network operators from multi-user transmissions in C-RAN. We solve the optimization problem for different fronthaul pricing models, in a scenario where real-time and accurate channel estimates are available and in another where only channel statistics are exploited. Using our method - fitting in the architecture that we have defined - cost efficiency of fronthaul usage can be significantly improved
4

Amoordon, Andy. "Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication." Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les réseaux sans-fil sont de plus en plus utilisés. La popularité de ces réseaux est due au fait que ces réseaux permettent de créer, modifier et étendre facilement un réseau informatique. Les réseaux sans-fil sont également particulièrement nécessaires pour relier des équipements mobiles tels que des montres connectées, voitures connectées, drones. Les réseaux sans-fil sont également utilisés dans le secteur du transport et de la sécurité pour relier les trains avec le centre de contrôle ou les caméras avec le centre d'enregistrement. Toutefois, contrairement aux réseaux filaires, dans les réseaux sans-fil, les transmissions ne sont pas isolées dans des câbles, mais transmises en utilisant généralement des antennes omnidirectionnelles. Pour ces raisons, il est plus facile d'écouter et d'émettre sans autorisation sur ces réseaux - les rendent ainsi plus vulnérables à certains types d'attaques. Dans cette thèse, nous nous sommes intéressés à la détection des trois différentes attaques sur les réseaux sans-fil IEEE 802.11 (Wi-Fi). Les trois attaques sont l'attaque par faux point d'accès et deux attaques de déni de service : notamment l'attaque par déauthentication et l'attaque par brouillage. Dans la littérature scientifique, les méthodes existantes proposent de détecter ces attaques de manière isolée et en analysant uniquement un ou deux indicateurs.Nous proposons une méthode utilisant des algorithmes de classification pour créer un modèle, capable de détecter les trois attaques en analysant quatre indicateurs simultanément. Le modèle peut également détecter les attaques lorsqu'elles sont réalisées de manière indépendante ou lorsqu'elles sont cumulées entre elles. Concernant les données utilisées pour créer le modèle, sur les trois types de trames qui peuvent être émis sur un réseau Wi-Fi, nous avons considéré exclusivement, les trames de gestion et plus particulièrement les trames de beacon. Les trames de beacon sont régulièrement émises même en l'absence de trafic utilisateur, ce qui rend le modèle plus efficace. Nous avons aussi considéré des variations concernant le débit du réseau (absence de trafic, trafic léger, moyen et intense) et la puissance du signal de brouillage (puissance forte, moyenne et faible). Les résultats montrent que le modèle arrive à détecter les attaques par faux point d'accès, par déauthentication, par brouillage (faible et moyenne puissance) avec grande précision et l'attaque par brouillage de forte puissance, avec une précision satisfaisante. Nous avons pu nettement augmenter la précision de détection de cette dernière variation en prenant en compte les trames de beacon d'un deuxième point d'accès éloigné du réseau. Enfin, nous avons aussi considéré le cas particulier des transmissions Wi-Fi sur la bande 5 GHz et les faux points d'accès fantômes
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They offer flexibility, mobility and rapid expansion of telecommunication infrastructures. They are also particularly needed to connect mobile devices such as connected cars, watches and drones. Wireless networks are also used in the transport and security sector to connect trains and cameras to monitoring systems. However, in contrary to wired networks in which transmission are isolated in wires, in wireless networks, transmissions are emitted using omnidirectional antennas. This makes wireless networks more vulnerable to unauthorised listening, emission and some specific attacks. In this thesis, we have worked on the detection of three different types of attacks on IEEE 802.11 (Wi-Fi) networks. The three attacks are fake access points and two denial of service attacks namely, deauthentication and jamming attacks. In scientific literature, these three attacks are detected independently and using one or two indicators.We propose a method that uses classification algorithms to create a model that can detect the three attacks by analysing four indicators simultaneously. The model can detect the attacks when they are perpetuated independently and also when they are combined. Concerning data used to create the model, among the three different types of frames that can be transmitted on Wi-Fi networks, we have considered only management frames and more particularly, beacon frames. Beacon frames are sent at regular interval and even in the absence of user traffic. Therefore, basing the detection on the analysis of beacon frames leads to a more efficient detection. In this thesis, we have also considered variations in data rates (absence of user traffic, light, moderate and intense user traffic) and in jamming power (low, moderate and high jamming power). Results show that the model can detect fake access points, deauthentication and jamming attacks (low and moderate power) with high precision. The jamming attack with intense power is detected with satisfying precision. By considering the beacon frames of a farther second access point of the network, we have been able to increase detection precision in the latter case. Finally, we have considered special cases such as Wi-Fi transmissions in the 5 GHz band and the phantom fake access point attack
5

Allouis, Alain. "NOMA-MCM strategies in transmission and reception for advanced vehicular communications in 5G and beyond." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le domaine des transports intelligents repose sur une infrastructure robuste de communication véhiculaire, essentielle à la gestion du trafic, à la surveillance des routes, à l'accessibilité à l'Internet des objets (IoT) et aux informations des conducteurs/passagers. Alors que la norme conventionnelle IEEE802.11p a longtemps dominé ce domaine, l'avènement de la 5G et de ses successeurs marque un changement de paradigme.Cette thèse représente une exploration complète des technologies 5G et au-delà spécifiquement adaptées aux exigences uniques de la communication véhicule-à-tout (V2X). L'objectif principal est une analyse méticuleuse de la technologie Non-Orthogonal Multiple Access (NOMA) et des schémas de modulation multiporteuse (MCM) dans le contexte des applications V2X de nouvelle génération. Au cœur de cette exploration se trouve la recherche de stratégies de conception PHY/MAC (couches physique et de contrôle d'accès au support) transversales visant à élever les performances.Le parcours de recherche commence par une vue d'ensemble introductive, plongeant dans le contexte historique et la pertinence des communications V2X, accompagnée d'un examen des diverses exigences des groupes de cas d'utilisation V2X. Ce travail préliminaire combine des connaissances issues d'organisations normatives et des dernières publications, offrant une vue d'ensemble complète du paysage historique de la communication véhiculaire.Ensuite, la thèse navigue dans le paysage contemporain, mettant l'accent sur l'application des technologies 5G aux différents cas d'utilisation V2X. Elle cartographie la relation entre les groupes de cas d'utilisation V2X et les technologies habilitantes tout en explorant l'architecture hiérarchique 5G V2X. Cette exploration fait le lien entre les exigences actuelles de communication, les normes existantes et les directions de recherche ouvertes ainsi que les défis imminents.Le cœur de la thèse tourne autour de l'exploration des implications des schémas NOMA et MCM dans les applications V2X de prochaine génération. La culmination de cette recherche se manifeste dans un paradigme de conception transversale axé sur l'amélioration des performances et de l'adaptabilité des systèmes de communication cellulaires véhiculaires à tout (C-V2X). En disséquant les mécanismes NOMA au sein des couches physique et de contrôle d'accès au support (PHY/MAC), cette étude démontre des améliorations substantielles des performances de débit par rapport aux systèmes d'accès multiple orthogonal (OMA) conventionnels.Les résultats de cette thèse aspirent à contribuer à des solutions avancées pour les futurs systèmes de transport autonomes et connectés, avec un accent spécifique sur l'amélioration des performances des couches physique et d'accès au support dans des scénarios V2X sophistiqués
The realm of intelligent transportation hinges upon robust vehicular communication infrastructure, vital for traffic management, road monitoring, Internet of Things (IoT) accessibility, and driver/passenger information. While the conventional IEEE802.11p standard has long dominated this domain, the advent of 5G and its successors marks a paradigm shift.This thesis represents a comprehensive exploration of 5G and beyond technologies specifically tailored to the unique demands of Vehicle-to-Everything (V2X) communication. The primary aim is a meticulous analysis of Non-Orthogonal Multiple Access (NOMA) technology and Multi-Carrier Modulation (MCM) schemes within the context of next-generation V2X applications. Central to this exploration is the pursuit of cross-layer PHY/MAC (Physical Layer/Medium Access Control) design strategies aimed at elevating performance benchmarks.The research journey begins with an introductory overview, delving into the historical context and relevance of V2X communications, accompanied by an examination of the diverse requirements across V2X use case groups. This foundational groundwork combines insights from normative organizations and the latest literature, providing a comprehensive overview of the historical landscape of vehicular communication.Subsequently, the thesis navigates the contemporary landscape, emphasizing the application of 5G enabling technologies to various V2X use cases. It maps the relationship between V2X Use Case Groups and Enabling Technologies while exploring the Hierarchical 5G V2X high-level architecture. This exploration bridges current communication requirements and existing standards with open research directions and impending challenges.The core of the thesis revolves around the exploration of NOMA and MCM schemes' implications within next-generation V2X applications. The culmination of this research manifests in a cross-layer design paradigm focusing on the enhancement of performance and adaptability within cellular vehicle-to-everything (C-V2X) communication systems. By dissecting NOMA mechanisms within the Physical/Medium Access Control (PHY/MAC) layers, this study demonstrates substantial throughput performance improvements compared to conventional Orthogonal Multiple Access (OMA) systems.The outcomes of this thesis aspire to contribute advanced solutions for future autonomous and connected transport systems, with a specific emphasis on the enhancement of physical and medium access layer performance within sophisticated V2X scenarios
6

Harrison, Willie K. "Physical-layer security: practical aspects of channel coding and cryptography." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this work, a multilayer security solution for digital communication systems is provided by considering the joint effects of physical-layer security channel codes with application-layer cryptography. We address two problems: first, the cryptanalysis of error-prone ciphertext; second, the design of a practical physical-layer security coding scheme. To our knowledge, the cryptographic attack model of the noisy-ciphertext attack is a novel concept. The more traditional assumption that the attacker has the ciphertext is generally assumed when performing cryptanalysis. However, with the ever-increasing amount of viable research in physical-layer security, it now becomes essential to perform the analysis when ciphertext is unreliable. We do so for the simple substitution cipher using an information-theoretic framework, and for stream ciphers by characterizing the success or failure of fast-correlation attacks when the ciphertext contains errors. We then present a practical coding scheme that can be used in conjunction with cryptography to ensure positive error rates in an eavesdropper's observed ciphertext, while guaranteeing error-free communications for legitimate receivers. Our codes are called stopping set codes, and provide a blanket of security that covers nearly all possible system configurations and channel parameters. The codes require a public authenticated feedback channel. The solutions to these two problems indicate the inherent strengthening of security that can be obtained by confusing an attacker about the ciphertext, and then give a practical method for providing the confusion. The aggregate result is a multilayer security solution for transmitting secret data that showcases security enhancements over standalone cryptography.
7

Seong, Kibeom. "Cross-layer resource allocation for multi-user communication systems /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Meilong. "Robust cross-layer scheduling design in multi-user multi-antenna wireless systems." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B38346758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jiang, Meilong, and 江美龍. "Robust cross-layer scheduling design in multi-user multi-antenna wireless systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B38346758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Breschi, Karla. "Optimisation multi-objectif des communications dans les réseaux de capteurs hétérogènes." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD045/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cette thèse étudie les problèmes d’optimisation bi-objectifs des communications dans les réseaux de capteurs hétérogènes du point de vue de la portée de transmission. Le premier critère considéré est nécessairement l'énergie qu’il s’agit d'économiser pour maximiser la durée de vie du réseau. Le second critère, primordial dans le cas des applications en temps réel, est le délai d'acheminement des données. Pour résoudre le problème d’optimalité de la diffusion, nous proposons une formulation en nombres entiers, un algorithme d’approximation, une méta-heuristique et une heuristique permettant de trouver ou s’approcher de l’optimal pour les objectifs considérés.Pour le cas du routage, nous proposons une approche cross-layer via un programme linéaire en nombre entiers entre les couches MAC et Liaison de données permettant de calculer l'optimal et ainsi d'avoir un point de comparaison pour les futures heuristiques ayant les mêmes objectifs
This thesis studies the problems of bi-objective optimization of communications in heterogeneous wireless sensor networks from the point of view of the transmission range. The first criterion considered is necessarily the energy consumption that needs to be reduced in order to maximize the network lifetime. The second criterion is the data transmission delay, which is essential for real-time applications.To solve the optimality problem of the broadcast, we propose an integer linear program, an approximation algorithm, a meta-heuristic and a heuristic. All these techniques allow us to find or to approximate the optimal solutions for the considered objectives.For the routing case, we propose a cross-layer approach via an integer linear program between the MAC and Data Link layers. Our method calculates the optimal solution, which represents a point of comparison for future heuristics having the same goals

Books on the topic "Multi-Layer communications":

1

Hong, Y. W. Peter, Pang-Chang Lan, and C. C. Jay Kuo. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-4560-14-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kuo, C. C. Jay, Pang-Chang Lan, and Y. W. Peter Hong. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kuo, C. C. Jay, Y. W. Peter Hong, and Pang-Chang Lan. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multi-Layer communications":

1

Wörner, Michael, and Thomas Ertl. "SmoothScroll: A Multi-scale, Multi-layer Slider." In Communications in Computer and Information Science, 142–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-32350-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baumann, M., T. Müller, W. Ooghe, A. Santos, S. B. Winstanley, and M. Zeller. "Multi-layer modelling of a multimedia application." In Broadband Communications, 565–76. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35378-4_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Assimi, Abdel-Nasser, Charly Poulliat, and Inbar Fijalkow. "Reliable Communications Using Multi-layer Transmission." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 306–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11284-3_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ivaschenko, Anton, Sergey Maslennikov, Anastasia Stolbova, and Oleg Golovnin. "Multi-layer Parallelization in Transportation Management Software." In Communications in Computer and Information Science, 44–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88378-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rai, Andri, and Eul Gyu Im. "Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection." In Communications in Computer and Information Science, 219–35. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1274-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cui, Jianqun, Yanxiang He, Libing Wu, Naixue Xiong, Hui Jin, and Laurence T. Yang. "Multi-domain Topology-Aware Grouping for Application-Layer Multicast." In High Performance Computing and Communications, 623–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75444-2_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qi, Xingyun, Pingjing Lu, Jijun Cao, Yi Dai, Mingche Lai, and Junsheng Chang. "MPLEG: A Multi-mode Physical Layer Error Generator for Link Layer Fault Tolerance Test." In Communications in Computer and Information Science, 56–69. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8135-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Li-wei, Yu-qing Zhang, Xiao-xiong Tian, Yu-hua Qian, Zeng-liang Bai, and Shi-hui Zheng. "Multi-layer Quantum Secret Sharing Based on GHZ States." In Communications in Computer and Information Science, 674–85. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8083-3_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Palmirani, Monica, and Luca Cervone. "A Multi-layer Digital Library for Mediaeval Legal Manuscripts." In Communications in Computer and Information Science, 81–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35834-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fernández, Susel, Ivan Marsa-Maestre, and Juan R. Velasco. "Performing Ontology Alignment via a Fuzzy-Logic Multi-layer Architecture." In Communications in Computer and Information Science, 194–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-54105-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multi-Layer communications":

1

Otani, Tomohiro, and Kenichi Ogaki. "GMPLS multi-layer network." In Asia-Pacific Optical Communications, edited by Yong Hyub Won, Gee-Kung Chang, Ken-ichi Sato, and Jian Wu. SPIE, 2006. http://dx.doi.org/10.1117/12.692724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yongkai Huo, Xin Zuo, Robert G. Maunder, and Lajos Hanzo. "Inter-layer FEC decoded multi-layer video streaming." In GLOBECOM 2012 - 2012 IEEE Global Communications Conference. IEEE, 2012. http://dx.doi.org/10.1109/glocom.2012.6503428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nordell, Viktor, Anders Gavler, and Pontus Sköldström. "GMPLS controlled multi-layer Ethernet." In Asia Communications and Photonics Conference and Exhibition. Washington, D.C.: OSA, 2010. http://dx.doi.org/10.1364/acp.2010.79890g.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nordell, Viktor, Anders Gavler, and Pontus Sköldström. "GMPLS controlled multi-layer ethernet." In Asia Communications and Photonics Conference and Exhibition, edited by Lena Wosinska. SPIE, 2010. http://dx.doi.org/10.1117/12.888658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gerstel, Ori. "The Age of Multi-Layer Networking." In Asia Communications and Photonics Conference. Washington, D.C.: OSA, 2013. http://dx.doi.org/10.1364/acp.2013.ath2a.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gerstel, Ori. "The Age of Multi-Layer Networking." In Asia Communications and Photonics Conference. Washington, D.C.: OSA, 2013. http://dx.doi.org/10.1364/acpc.2013.ath2a.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shen, Gangxiang. "Survivable Multi-layer Elastic optical Networks." In Asia Communications and Photonics Conference. Washington, D.C.: OSA, 2016. http://dx.doi.org/10.1364/acpc.2016.af3e.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oselio, Brandon, Siiia Liu, and Alfred Hero. "Multi-Layer Relevance Networks." In 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2018. http://dx.doi.org/10.1109/spawc.2018.8446016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gelman, Andriy, Pier Luigi Dragotti, and Vladan Velisavljevic. "Layer based multi-view image compression." In 5th International Mobile Multimedia Communications Conference. ICST, 2009. http://dx.doi.org/10.4108/icst.mobimedia2009.7489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Valcarenghi, L., F. Paolucci, P. Castoldi, L. Rossi, and F. Cugini. "Integrated multi-layer bandwidth recovery for multimedia communications." In 2006 Workshop on High Performance Switching and Routing. IEEE, 2006. http://dx.doi.org/10.1109/hpsr.2006.1709723.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Multi-Layer communications":

1

Chapman, Ray, Phu Luong, Sung-Chan Kim, and Earl Hayter. Development of three-dimensional wetting and drying algorithm for the Geophysical Scale Transport Multi-Block Hydrodynamic Sediment and Water Quality Transport Modeling System (GSMB). Engineer Research and Development Center (U.S.), July 2021. http://dx.doi.org/10.21079/11681/41085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Environmental Laboratory (EL) and the Coastal and Hydraulics Laboratory (CHL) have jointly completed a number of large-scale hydrodynamic, sediment and water quality transport studies. EL and CHL have successfully executed these studies utilizing the Geophysical Scale Transport Modeling System (GSMB). The model framework of GSMB is composed of multiple process models as shown in Figure 1. Figure 1 shows that the United States Army Corps of Engineers (USACE) accepted wave, hydrodynamic, sediment and water quality transport models are directly and indirectly linked within the GSMB framework. The components of GSMB are the two-dimensional (2D) deep-water wave action model (WAM) (Komen et al. 1994, Jensen et al. 2012), data from meteorological model (MET) (e.g., Saha et al. 2010 - http://journals.ametsoc.org/doi/pdf/10.1175/2010BAMS3001.1), shallow water wave models (STWAVE) (Smith et al. 1999), Coastal Modeling System wave (CMS-WAVE) (Lin et al. 2008), the large-scale, unstructured two-dimensional Advanced Circulation (2D ADCIRC) hydrodynamic model (http://www.adcirc.org), and the regional scale models, Curvilinear Hydrodynamics in three dimensions-Multi-Block (CH3D-MB) (Luong and Chapman 2009), which is the multi-block (MB) version of Curvilinear Hydrodynamics in three-dimensions-Waterways Experiments Station (CH3D-WES) (Chapman et al. 1996, Chapman et al. 2009), MB CH3D-SEDZLJ sediment transport model (Hayter et al. 2012), and CE-QUAL Management - ICM water quality model (Bunch et al. 2003, Cerco and Cole 1994). Task 1 of the DOER project, “Modeling Transport in Wetting/Drying and Vegetated Regions,” is to implement and test three-dimensional (3D) wetting and drying (W/D) within GSMB. This technical note describes the methods and results of Task 1. The original W/D routines were restricted to a single vertical layer or depth-averaged simulations. In order to retain the required 3D or multi-layer capability of MB-CH3D, a multi-block version with variable block layers was developed (Chapman and Luong 2009). This approach requires a combination of grid decomposition, MB, and Message Passing Interface (MPI) communication (Snir et al. 1998). The MB single layer W/D has demonstrated itself as an effective tool in hyper-tide environments, such as Cook Inlet, Alaska (Hayter et al. 2012). The code modifications, implementation, and testing of a fully 3D W/D are described in the following sections of this technical note.

To the bibliography