Showing 21 - 40 results of 66 for search 'layer communication terminals', query time: 0.09s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36

    Space division and theory of graph-coloration-based protocol for multi-channel multi-transceiver operation in Internet of Vehicles by Lazhar Khamer, Sofiane Zaidi, Carlos T. Calafate

    Published 2025-05-01
    “…To overcome these issues and enhance overall network performance, we propose a Space Division and theory of Graph Coloration-based protocol for Multi-Channel Multi-Transceiver operation of the MAC layer (SDGC-MCMT) in the IoV. The protocol dynamically assigns service channels to vehicles based on their positions and schedules the transmission of packets across multiple transceivers to enhance efficiency and enable synchronous communication. …”
    Get full text
    Article
  17. 37

    Structural and Functional Reorganization of the Sensorimotor Cortex During Ligation of the Common Carotid Arteries (Experimental Study) by L. M. Makarieva, V. A. Akulinin, M. S. Korzhuk, S. S. Stepanov, A. Y. Shoronova, D. B. Avdeev, I. G. Tsuskman

    Published 2022-10-01
    “…To explore the structural and functional changes of neurons, glial cells, and synaptic terminals in layers I, III, and V of the sensorimotor cortex (SMC) of the rat brain after bilateral common carotid artery ligation (CCAL).Material and methods. …”
    Get full text
    Article
  18. 38

    Micro-station sleeping algorithm based on coverage area priority in 5G network by Ziren WANG, Yi LI

    Published 2022-07-01
    “…With the maturity of 5G mobile communication technology and the rapid growth of the number of mobile terminals, the problem of intensive energy consumption of 5G wireless communication system base stations is prominent.A micro base station area hierarchical sleep algorithm was proposed.Considering the impact of micro base station load, inter station distance and inter layer cooperation on micro base station sleep, the transitions number of the micro base station in the overlapping coverage area between macro base stations is less, and the priority sleep operation has a good energy-saving effect.The simulation result shows that the energy-saving rate is 23%, which can adapt to different network sizes, and the energy-saving effect is better in large-scale networks.…”
    Get full text
    Article
  19. 39

    Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment by Jianzhao Sun

    Published 2022-01-01
    “…With the rapid development of mobile communication technology, the data transmission rate of mobile communication has been significantly improved and emerging Internet of things applications need a lot of computing resources to meet their own computing needs. …”
    Get full text
    Article
  20. 40

    Efficient secure federated learning aggregation framework based on homomorphic encryption by Shengxing YU, Zhong CHEN

    Published 2023-01-01
    “…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
    Get full text
    Article