Journal articles on the topic 'Multi-Layer communications'

To see the other types of publications on this topic, follow the link: Multi-Layer communications.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi-Layer communications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Iqbal, Farabi, Jeroen van der Ham, and Fernando Kuipers. "Technology-aware multi-domain multi-layer routing." Computer Communications 62 (May 2015): 85–96. http://dx.doi.org/10.1016/j.comcom.2015.01.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dosti Kh. Abbas, Dosti Kh Abbas, Tarik A. Rashid Dosti Kh. Abbas, Karmand H. Abdalla Tarik A. Rashid, Nebojsa Bacanin Karmand H. Abdalla, and Abeer Alsadoon Nebojsa Bacanin. "Using Fitness Dependent Optimizer for Training Multi-layer Perceptron." 網際網路技術學刊 22, no. 7 (December 2021): 1575–85. http://dx.doi.org/10.53106/160792642021122207011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bogucka, Hanna, and Oliver Holland. "Multi-Layer Approach to Future Green Mobile Communications." IEEE Intelligent Transportation Systems Magazine 5, no. 4 (2013): 28–37. http://dx.doi.org/10.1109/mits.2013.2263461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khorshid, Ahmed E., Ibrahim N. Alquaydheb, Ahmed M. Eltawil, and Fadi J. Kurdahi. "Physical Multi-Layer Phantoms for Intra-Body Communications." IEEE Access 6 (2018): 42812–21. http://dx.doi.org/10.1109/access.2018.2849709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

CLARK, KEITH, PETER J. ROBINSON, and RICHARD HAGEN. "Multi-threading and message communication in Qu-Prolog." Theory and Practice of Logic Programming 1, no. 3 (May 2001): 283–301. http://dx.doi.org/10.1017/s147106840100120x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper presents the multi-threading and internet message communication capabilities of Qu-Prolog. Message addresses are symbolic and the communications package provides high-level support that completely hides details of IP addresses and port numbers as well as the underlying TCP/IP transport layer. The combination of the multi-threads and the high level inter-thread message communications provide simple, powerful support for implementing internet distributed intelligent applications.
6

Khan, Usman Ali, and Sang Sun Lee. "Multi-Layer Problems and Solutions in VANETs: A Review." Electronics 8, no. 2 (February 11, 2019): 204. http://dx.doi.org/10.3390/electronics8020204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Dedicated Short Range Communication (DSRC) technology supports the vehicular communications through Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) Communication, by operating at 5.9 GHz band (U.S. Standard). The Physical (PHY) and Medium Access Control (MAC) Layer are defined by the IEEE 802.11p, while the IEEE 1609 family of standards define the Wireless Access in Vehicular Environment (WAVE); a suite of communication and security standards in the Vehicular Area Networks (VANETs). There has been a lot of research regarding several challenges in VANETs, from spectrum utilization to multichannel operation and from routing to security issues. The aim of all is to improve the performance of the network and support scalability in VANETs; which is defined as the ability of the network to handle the addition of vehicles (nodes) without suffering noticeable degradation of performance or administrative overhead. In this paper, we aim to highlight multilayer challenges concerning the performance of the VANETs, the already proposed solutions, and the possible future work.
7

Wang, Yuefeng, and Ibrahim Matta. "Multi-layer Virtual Transport Network management." Computer Communications 130 (October 2018): 38–49. http://dx.doi.org/10.1016/j.comcom.2018.08.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuipers, Fernando, and Freek Dijkstra. "Path selection in multi-layer networks." Computer Communications 32, no. 1 (January 2009): 78–85. http://dx.doi.org/10.1016/j.comcom.2008.09.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Diaz, Sergio, Diego Mendez, and Rolf Kraemer. "A Multi-Layer Self-Healing Algorithm for WSNs." Journal of Circuits, Systems and Computers 29, no. 05 (July 3, 2019): 2050070. http://dx.doi.org/10.1142/s021812662050070x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The implementation of Wireless Sensor Networks (WSNs) is a challenging task due to their intrinsic characteristics, e.g., energy limitations and unreliable wireless links. Considering this, we have developed the Disjoint path And Clustering Algorithm (DACA) that combines topology control and self-healing mechanisms to increase the network lifetime with minimum loss of coverage. Initially, DACA constructs a tree that includes all nodes of the network by using the Collection Tree Protocol (CTP). This tree is an initial communication backbone through which DACA centralizes the information. Then, DACA builds a set of spatial clusters using Kmeans and selects the Cluster Heads (CHs) using Particle Swarm Optimization (PSO) and a multi-objective optimization (MOO) function. Subsequently, DACA reconstructs the tree using only the CHs. In this way, DACA reduces the number of active nodes in the network and saves energy. Finally, DACA finds disjoint paths on the reconstructed tree by executing the N-to-1 multipath discovery protocol. By doing so, the network can overcome communications failures with a low control message overhead. The simulations on Castalia show that DACA considerably extends the network lifetime by having a set of inactive nodes and disjoint paths that support the communication when active nodes die. Besides, DACA still maintains a good coverage of the area of interest despite the inactive nodes. Additionally, we evaluate the shape of the tree (i.e., the average number of hops) and the risk of connection loss of the network.
10

Chan, Vincent W. S. "Multi-Layer Network Security Architecture." IEEE Communications Magazine 58, no. 12 (December 2020): 4. http://dx.doi.org/10.1109/mcom.2020.9311934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bononi, Luciano, Marco Di Felice, Antonella Molinaro, and Sara Pizzi. "Enhancing multi-hop communication over multi-radio multi-channel wireless mesh networks: A cross-layer approach." Computer Communications 34, no. 13 (August 2011): 1559–69. http://dx.doi.org/10.1016/j.comcom.2010.12.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yi, Zhao Xiang, Yong Xian, Xiong Mei Zhang, Hua Peng Zhang, and Xiao Dong Mu. "Simulation and Analysis for Meteor Burst Communications Based on OPNET." Applied Mechanics and Materials 738-739 (March 2015): 1205–8. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Meteor burst communication is an important communication mode for a number of possible civilian and military applications. This paper proposes a channel modeling and simulation based on OPNET for meteor burst communications. Analyzing the characteristics of underdense meteor burst channel, the multi-layer node models of master station and slave station are presented to create practical simulation scenario of meteor burst communications. The simulation processes of half-duplex communication as well as full-duplex communication are designed to execute simulation. The results demonstrated that the channel model based on OPNET is consisted with meteor burst communication very well, and full-duplex communication is better than full-duplex communication in effectiveness.
13

Wang, Zhao, Qingguo Xu, and Weimin Li. "Multi-Layer Feature Fusion-Based Community Evolution Prediction." Future Internet 14, no. 4 (April 6, 2022): 113. http://dx.doi.org/10.3390/fi14040113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Analyzing and predicting community evolution has many important applications in criminology, sociology, and other fields. In community evolution prediction, most of the existing research is simply calculating the features of the community, and then predicting the evolution event through the classifier. However, these methods do not consider the complex characteristics of community evolution, and only predict the community’s evolution from a single level. To solve these problems, this paper proposes an algorithm called multi-layer feature fusion-based community evolution prediction, which obtains features from the community layer and node layer. The final community feature is the fusion of the two layer features. At the node layer, this paper proposes a global and local-based role-extraction algorithm. This algorithm can effectively discover different roles in the community. In this way, we can distinguish the influence of nodes with different characteristics on the community evolution. At the community layer, this paper proposes to use the community hypergraph to obtain the inter-community interaction relationship. After all the features are obtained, this paper trains a classifier through these features and uses them in community evolution prediction. The experimental results show that the algorithm proposed in this paper is better than other algorithms in terms of prediction effect.
14

WANG Hui-qin, 王惠琴, 李亚婷 LI Ya-ting, 曹明华 CAO Ming-hua, and 包仲贤 BAO Zhong-xian. "Multi-layer Spatial Pulse Position Amplitude Modulation in Atmospheric Laser Communications." ACTA PHOTONICA SINICA 49, no. 5 (2020): 501002. http://dx.doi.org/10.3788/gzxb20204905.0501002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yamashita, Fumihiro, Munehiro Matsui, Hisayoshi Kano, and Junichi Abe. "Multi-layer Non-terrestrial Network for Beyond 5G/6G Mobile Communications." NTT Technical Review 21, no. 8 (August 2023): 23–27. http://dx.doi.org/10.53829/ntr202308fa2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Höyhtyä, Marko, Antti Anttonen, Mikko Majanen, Anastasia Yastrebova-Castillo, Mihaly Varga, Luca Lodigiani, Marius Corici, and Hemant Zope. "Multi-Layered Satellite Communications Systems for Ultra-High Availability and Resilience." Electronics 13, no. 7 (March 29, 2024): 1269. http://dx.doi.org/10.3390/electronics13071269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Satellite communications systems provide a means to connect people and devices in hard-to-reach locations. Traditional geostationary orbit (GEO) satellite systems and low Earth orbit (LEO) constellations, having their own strengths and weaknesses, have been used as separate systems serving different markets and customers. In this article, we analyze how satellite systems in different orbits could be integrated together and used as a multi-layer satellite system (MLSS) to improve communication services. The optimization concerns combining the strengths of different layers that include a larger coverage area as one moves up by each layer of altitude and a shorter delay as one moves down by each layer of altitude. We review the current literature and market estimates and use the information to provide a thorough assessment of the economic, regulatory, and technological enablers of the MLSS. We define the MLSS concept and the architecture and describe our testbed and the simulation tools used as a comprehensive engineering proof-of-concept. The validation results confirm that the MLSS approach can intelligently exploit the smaller jitter of GEO and shorter delay of LEO connections, and it can increase the availability and resilience of communication services. As a main conclusion, we can say that multi-layered networks and the integration of satellite and terrestrial segments seem very promising candidates for future 6G systems.
17

Gao, Yang, Neng Chang, and Kai Shang. "Multi-layer and multi-order fine-grained feature learning for artwork attribute recognition." Computer Communications 173 (May 2021): 214–19. http://dx.doi.org/10.1016/j.comcom.2021.03.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Fodor, Péter, Gábor Enyedi, Gábor Rétvári, and Tibor Cinkler. "Layer-preference policies in multi-layer GMPLS networks." Photonic Network Communications 18, no. 3 (February 25, 2009): 300–313. http://dx.doi.org/10.1007/s11107-009-0193-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Madeira, João, João Guerreiro, Rui Dinis, Paulo Montezuma, and Luís Miguel Campos. "On the Physical Layer Security Characteristics for MIMO-SVD Techniques for SC-FDE Schemes." Sensors 19, no. 21 (November 1, 2019): 4757. http://dx.doi.org/10.3390/s19214757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Multi-Input, Multi-Output (MIMO) techniques are seeing widespread usage in wireless communication systems due to their large capacity gains. On the other hand, security is a concern of any wireless system, which can make schemes that implement physical layer security key in assuring secure communications. In this paper, we study the physical layer security issues of MIMO with Singular Value Decomposition (SVD) schemes, employed along with Single-Carrier with Frequency-Domain Equalization (SC-FDE) techniques. More concretely. the security potential against an unintended eavesdropper is analysed, and it is shown that the higher the distance between the eavesdropper and the transmitter or receiver, the higher the secrecy rate. In addition, in a scenario where there is Line of Sight (LOS) between all users, it is shown that the secrecy rate can be even higher than in the previous scenario. Therefore, MIMO-SVD schemes combined with SC-FDE can be an efficient option for highly secure MIMO communications.
20

Huang, Cheng, Aimin Tang, Bangzhao Zhai, and Xudong Wang. "Physical layer forwarding for 5G multi-hop Backhaul networks." Computer Networks 207 (April 2022): 108830. http://dx.doi.org/10.1016/j.comnet.2022.108830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Chan, Vincent W. S. "Multi-Layer Network Research: Optical Networks." IEEE Communications Magazine 58, no. 9 (September 2020): 4. http://dx.doi.org/10.1109/mcom.2020.9214375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hu, Jingzhi, Zijie Zheng, Boya Di, and Lingyang Song. "Multi-Layer Radio Network Slicing for Heterogeneous Communication Systems." IEEE Transactions on Network Science and Engineering 7, no. 4 (October 1, 2020): 2378–91. http://dx.doi.org/10.1109/tnse.2020.3016031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

De Salve, Andrea, Damiano Di Francesco Maesa, Paolo Mori, Laura Ricci, and Alessandro Puccia. "A multi-layer trust framework for Self Sovereign Identity on blockchain." Online Social Networks and Media 37-38 (September 2023): 100265. http://dx.doi.org/10.1016/j.osnem.2023.100265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Jianguo, Neng Ye, Siqi Ma, Xiangyuan Bu, and Jianping An. "Multi-User Hybrid Beamforming Design for Physical Layer Secured mmWave LOS Communications." Electronics 10, no. 21 (October 28, 2021): 2635. http://dx.doi.org/10.3390/electronics10212635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper proposes a hybrid beamforming design algorithm for a multi-user physical layer security modulation technique. The hybrid beamforming scheme is used in the base station to generate multi-beams according to the direction angle of the target users. The base station first uses a secure analog beamforming scheme to generate analog beams in multiple desired directions, then uses minimum mean square error (MMSE) to design the digital beamforming matrix to eliminate inter-beam interference. Due to randomly selecting a subset of antennas to transmit signals at the symbol rate, the base station transmits the defined constellation to the target users and projects the randomized constellation in the other angles. In addition, the superposition of signals is affected by a randomly selected antennas subset, resulting in higher sidelobe energy. However, due to the integer optimization target, the optimization problem of antenna subsets is non-trivial. Therefore, this paper proposes a cross-entropy iteration method to choose the optimal antenna combination to reduce the sidelobe energy. The simulation shows that the proposed method in this paper has about 10 dB lower sidelobe energy than the random selection method. Besides, the eavesdropper’s symbol error rate of QPSK is always 0.75, while the multi-target users meet the quality of service requirements.
25

Socievole, A., E. Yoneki, F. De Rango, and J. Crowcroft. "ML-SOR: Message routing using multi-layer social networks in opportunistic communications." Computer Networks 81 (April 2015): 201–19. http://dx.doi.org/10.1016/j.comnet.2015.02.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Yuefeng, and Ibrahim Matta. "Multi-layer Virtual Transport Network Design." Journal of Network and Systems Management 26, no. 3 (November 11, 2017): 755–89. http://dx.doi.org/10.1007/s10922-017-9442-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Harman, Daniel, Karl Knapp, Tyler Sweat, Philip Lundrigan, Michael Rice, and Willie Harrison. "Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel." Entropy 25, no. 10 (September 29, 2023): 1397. http://dx.doi.org/10.3390/e25101397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications. We consider the secrecy capacity of a wireless Gaussian wiretap channel using channel sounding measurements to analyze the potential for secure communication in a real-world scenario. A multi-input, multi-output, multi-eavesdropper (MIMOME) system is deployed using orthogonal frequency division multiplexing (OFDM) over an 802.11n wireless network. Channel state information (CSI) measurements were taken in an indoor environment to analyze time-varying scenarios and spatial variations. It is shown that secrecy capacity is highly affected by environmental changes, such as foot traffic, network congestion, and propagation characteristics of the physical environment. We also present a numerical method for calculating MIMOME secrecy capacity in general and comment on the use of OFDM with regard to calculating secrecy capacity.
28

Honar Pajooh, Houshyar, Mohammad Rashid, Fakhrul Alam, and Serge Demidenko. "Multi-Layer Blockchain-Based Security Architecture for Internet of Things." Sensors 21, no. 3 (January 24, 2021): 772. http://dx.doi.org/10.3390/s21030772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.
29

Zhang, Rong, and Lajos Hanzo. "Multi-layer Modulation for Intensity-Modulated Direct-Detection Optical OFDM." Journal of Optical Communications and Networking 5, no. 12 (November 27, 2013): 1402. http://dx.doi.org/10.1364/jocn.5.001402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wei, Wei, Qingji Zeng, Jimin Liu, Jun Huang, and Pengcheng Xiao. "Differentiated multi-layer integrated routing in IP over WDM networks." Computer Communications 27, no. 16 (October 2004): 1594–607. http://dx.doi.org/10.1016/j.comcom.2004.05.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Belotti, Pietro, Antonio Capone, Giuliana Carello, and Federico Malucelli. "Multi-layer MPLS network design: The impact of statistical multiplexing." Computer Networks 52, no. 6 (April 2008): 1291–307. http://dx.doi.org/10.1016/j.comnet.2008.01.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Shahrivar, Ebrahim Moradi, and Shreyas Sundaram. "The Strategic Formation of Multi-Layer Networks." IEEE Transactions on Network Science and Engineering 2, no. 4 (October 1, 2015): 164–78. http://dx.doi.org/10.1109/tnse.2015.2500162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ghasemzadeh, Hamzeh. "Multi-Layer Architecture for Efficient Steganalysis of UnderMp3Cover in Multi-Encoder Scenario." IEEE Transactions on Information Forensics and Security 14, no. 1 (January 2019): 186–95. http://dx.doi.org/10.1109/tifs.2018.2847678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sabella, Roberto, and Xipeng Xiao. "Guest Editorial Traffic Engineering for Multi-Layer Networks." IEEE Journal on Selected Areas in Communications 25, no. 5 (June 2007): 865–67. http://dx.doi.org/10.1109/jsac.2007.070601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Dijkstra, Freek, Jeroen van der Ham, Paola Grosso, and Cees de Laat. "A path finding implementation for multi-layer networks." Future Generation Computer Systems 25, no. 2 (February 2009): 142–46. http://dx.doi.org/10.1016/j.future.2008.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gunasekaran, Elavarasi, and Vanitha Muthuraman. "A new double layer multi-secret sharing scheme." China Communications 21, no. 1 (January 2024): 287–309. http://dx.doi.org/10.23919/jcc.fa.2021-0162.202401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yan, Shi Hua, and Gang Li. "Realization of Interactive Communication among Multi-Sensors Based on CAN Bus." Key Engineering Materials 467-469 (February 2011): 497–502. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Aiming at the problems of the interactive communication among infrared multi-sensors under the electromagnetic interference, an interactive network is developed based on CAN bus controller which is embed in TMS320F2812 DSP. After the hardware design of the network system is introduced, a application layer protocol of CAN bus network for simple and effective communications is proposed. Following the protocol, software program is designed, and the transmission efficiency is improved obviously. Finally, the relationship between nodes and baud Rate is shown after analyzing the transmission time delay.
38

Yang, Shusen, Zhengguo Sheng, Julie A. McCann, and Kin K. Leung. "Distributed Stochastic Cross-Layer Optimization for Multi-Hop Wireless Networks With Cooperative Communications." IEEE Transactions on Mobile Computing 13, no. 10 (October 2014): 2269–82. http://dx.doi.org/10.1109/tmc.2013.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mahmoud, Basma A. "Performance Evaluation of Cooperative Multi-Layer IDMA Communications with Amplify-and-Forward Protocol." International Journal of Wireless Communications and Mobile Computing 1, no. 1 (2013): 21. http://dx.doi.org/10.11648/j.wcmc.20130101.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Suliyanti, Widya Nita, and Riri Fitri Sari. "Blockchain-Based Double-Layer Byzantine Fault Tolerance for Scalability Enhancement for Building Information Modeling Information Exchange." Big Data and Cognitive Computing 7, no. 2 (May 9, 2023): 90. http://dx.doi.org/10.3390/bdcc7020090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A Practical Byzantine Fault Tolerance (PBFT) is a consensus algorithm deployed in a consortium blockchain that connects a group of related participants. This type of blockchain suits the implementation of the Building Information Modeling (BIM) information exchange with few participants. However, when much more participants are involved in the BIM information exchange, the PBFT algorithm, which inherently requires intensive communications among participating nodes, has limitations in terms of scalability and performance. The proposed solution for a multi-layer BFT hypothesizes that multi-layer BFT reduces communication complexity. However, having more layers will introduce more latency. Therefore, in this paper, Double-Layer Byzantine Fault Tolerance (DLBFT) is proposed to improve the blockchain scalability and performance of BIM information exchange. This study shows a double-layer network structure of nodes that can be built with each node on the first layer, which connects and forms a group with several nodes on the second layer. This network runs the Byzantine Fault Tolerance algorithm to reach a consensus. Instead of having one node send messages to all the nodes in the peer-to-peer network, one node only sends messages to a limited number of nodes on Layer 1 and up to three nodes in each corresponding group in Layer 2 in a hierarchical network. The DLBFT algorithm has been shown to reduce the required number of messages exchanged among nodes by 84% and the time to reach a consensus by 70%, thus improving blockchain scalability. Further research is required if more than one party is involved in multi-BIM projects.
41

Deng, Zhongliang, Xiaoyi Yu, Wenliang Lin, Ke Wang, Hao Liu, Lei Gu, Yang Liu, and Xiaojuan Ma. "A Multi-Beam Satellite Cooperative Transmission Scheme Based on Resources Optimization and Packets Segmentation." Electronics 10, no. 22 (November 18, 2021): 2841. http://dx.doi.org/10.3390/electronics10222841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Multi-beam satellite communication systems are promising architectures in the future. A packet is transmitted by multi-satellite and multi-beam cooperatively, which can provide efficient spectrum utilization, improve system throughput, and guarantee Quality of Services (QoS). In multi-beam satellite communication systems, multi-layer and multi-dimensional radio resources change dynamically, which leads to the discontinuity of optimal resources and the lack of mapping balance between packets and radio resources. To deal with these problems, we propose a cross-layer and cross-dimension radio resources optimization model based on the weighted discrete firefly algorithm and an adaptive packet segmentation scheme based on the irregular gradient algorithm. The cross-layer and cross-dimension radio resources optimization model based on the weighted discrete firefly algorithm simulates cross-layer and cross-dimension optimization for the high-dynamic and multi-dimensional radio resources by considering the channel state information (CSI) and QoS in the multi-beam satellite communication system. The optimal resources are taken as the weight of irregular gradient algorithm to segment packets and map packets to radio resources, which can realize the mapping balance between packets and radio resources and ensure the efficiency and reliability of communication. The simulations show that the new transmission scheme improves the normalized system throughput and user satisfaction index by 18.7% and 6.2%, respectively.
42

TATIPAMULA, M., E. OKI, I. INOUE, K. SHIOMOTO, and Z. ALI. "Framework for PCE Based Multi-Layer Service Networks." IEICE Transactions on Communications E90-B, no. 8 (August 1, 2007): 1903–11. http://dx.doi.org/10.1093/ietcom/e90-b.8.1903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Yizhen, and Haifeng Hu. "Multi-layer Adaptive Feature Fusion for Semantic Segmentation." Neural Processing Letters 51, no. 2 (October 24, 2019): 1081–92. http://dx.doi.org/10.1007/s11063-019-10129-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

ZHANG, PENGCHENG, SRINIVAS PEETA, and TERRY FRIESZ. "Dynamic Game Theoretic Model of Multi-Layer Infrastructure Networks." Networks and Spatial Economics 5, no. 2 (June 2005): 147–78. http://dx.doi.org/10.1007/s11067-005-2627-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chambers, B., and A. Tennant. "Reflectivity null tuning in multi-layer phase-switched active radar absorbers." IEE Proceedings - Radar, Sonar and Navigation 152, no. 4 (2005): 245. http://dx.doi.org/10.1049/ip-rsn:20050014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Moniz, Daniela, João Pedro, and João Pires. "Dynamic multi-layer service-provisioning framework operating with reduced performance margins." Journal of Optical Communications and Networking 11, no. 9 (August 27, 2019): C35. http://dx.doi.org/10.1364/jocn.11.000c35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kantor, Mirosław, Edyta Biernacka, Piotr Boryło, Jerzy Domżał, Piotr Jurkiewicz, Miłosz Stypiński, and Robert Wójcik. "A survey on multi-layer IP and optical Software-Defined Networks." Computer Networks 162 (October 2019): 106844. http://dx.doi.org/10.1016/j.comnet.2019.06.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Dijkstra, Freek, Bert Andree, Karst Koymans, Jeroen van der Ham, Paola Grosso, and Cees de Laat. "A multi-layer network model based on ITU-T G.805." Computer Networks 52, no. 10 (July 2008): 1927–37. http://dx.doi.org/10.1016/j.comnet.2008.02.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Shi, Haohan, Xiyu Shi, and Safak Dogan. "Speech Inpainting Based on Multi-Layer Long Short-Term Memory Networks." Future Internet 16, no. 2 (February 17, 2024): 63. http://dx.doi.org/10.3390/fi16020063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Audio inpainting plays an important role in addressing incomplete, damaged, or missing audio signals, contributing to improved quality of service and overall user experience in multimedia communications over the Internet and mobile networks. This paper presents an innovative solution for speech inpainting using Long Short-Term Memory (LSTM) networks, i.e., a restoring task where the missing parts of speech signals are recovered from the previous information in the time domain. The lost or corrupted speech signals are also referred to as gaps. We regard the speech inpainting task as a time-series prediction problem in this research work. To address this problem, we designed multi-layer LSTM networks and trained them on different speech datasets. Our study aims to investigate the inpainting performance of the proposed models on different datasets and with varying LSTM layers and explore the effect of multi-layer LSTM networks on the prediction of speech samples in terms of perceived audio quality. The inpainted speech quality is evaluated through the Mean Opinion Score (MOS) and a frequency analysis of the spectrogram. Our proposed multi-layer LSTM models are able to restore up to 1 s of gaps with high perceptual audio quality using the features captured from the time domain only. Specifically, for gap lengths under 500 ms, the MOS can reach up to 3~4, and for gap lengths ranging between 500 ms and 1 s, the MOS can reach up to 2~3. In the time domain, the proposed models can proficiently restore the envelope and trend of lost speech signals. In the frequency domain, the proposed models can restore spectrogram blocks with higher similarity to the original signals at frequencies less than 2.0 kHz and comparatively lower similarity at frequencies in the range of 2.0 kHz~8.0 kHz.
50

Muñoz, P., D. Laselva, R. Barco, and P. Mogensen. "Dynamic traffic steering based on fuzzy Q-Learning approach in a multi-RAT multi-layer wireless network." Computer Networks 71 (October 2014): 100–116. http://dx.doi.org/10.1016/j.comnet.2014.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography