Mostrando 13,221 - 13,240 Resultados de 13,325 Para Buscar '"The Jam"', tiempo de consulta: 0.12s Limitar resultados
  1. 13221
  2. 13222
  3. 13223
    Publicado 2018
    Tabla de Contenidos: “…Attacks 102 -- 5.3 The Business Model Approach 103 -- 5.3.1 The 4C Typology of the ICT Business Model 104 -- 5.3.2 Business Models in the Context of Cyber Preparedness 105 -- 5.4 The Business Case of Cyber Security in the Era of 5G 106 -- 5.4.1 The Users and Issues of Cyber Security in 5G 108 -- 5.4.2 Scenarios for 5G Security Provisioning 109 -- 5.4.3 Delivering Cyber Security in 5G 110 -- 5.5 Business Model Options in 5G Cyber Security 112 -- 5.6 Acknowledgment 114 -- References 114 -- Part II 5G Network Security 117 -- 6 Physical Layer Security 119 /Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti -- 6.1 Introduction 119 -- 6.1.1 Physical Layer Security in 5G Networks 120 -- 6.1.2 Related Work 121 -- 6.1.3 Motivation 121 -- 6.2 WBPLSec System Model 123 -- 6.2.1 Transmitter 124 -- 6.2.2 Jamming Receiver 126 -- 6.2.3 Secrecy Metrics 126 -- 6.2.4 Secrecy Capacity of WBPLSec 128 -- 6.2.5 Secrecy Capacity of iJAM 129 -- 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver 131 -- 6.3.1 Simulation Scenario for Secrecy Capacity 134 -- 6.4 WBPLSec Applied to 5G networks 136 -- 6.5 Conclusions 138 -- References 139 -- 7 5G?]…”
    Libro electrónico
  4. 13224
    por Grebennikov, Andrei, 1956-
    Publicado 2011
    “…This text explores the results of well-known and new theoretical analyses, while informing readers of modern radio transmitters' pracitcal designs and their components. Jam-packed with information, this book broadcasts and streamlines the author's considerable experience in RF and microwave design and development…”
    Libro electrónico
  5. 13225
  6. 13226
  7. 13227
  8. 13228
  9. 13229
  10. 13230
  11. 13231
  12. 13232
  13. 13233
  14. 13234
    por Kamal, Raj
    Publicado 2011
    Tabla de Contenidos: “…7.7 Implementation Procedure -- Chapter 8: Sequential Circuits for Registers and Counters -- 8.1 Registers -- 8.1.1 Bi-stable Latches as the Register -- 8.1.2 Parallel-In Parallel-Out Buffer Register -- 8.1.3 Number of Bits in a Register -- 8.2 Shift Registers -- 8.2.1 Serial-In Serial-Out (SISO) Unidirectional Shift Register -- 8.2.2 Serial-In Parallel-Out (SIPO) Right Shift Register -- 8.2.3 Parallel-In Serial-Out (PISO) Right Shift Register -- 8.3 Counter -- 8.4 Ripple Counter -- 8.4.1 Cascaded Divide-By-2n Circuit as a Ripple Counter -- 8.4.2 Modulo-6, Modulo-7 and Modulo-10 Counters -- 8.4.3 Ring Counter -- 8.4.4 Johnson Counter (Even Sequences Switch Tail or Twisted Ring Counter) -- 8.4.5 Odd Sequencer Johnson Counter (Odd Sequencer Switch Tail or Twisted Ring Counter) -- 8.5 Synchronous Counter -- 8.5.1 Synchronous Counter Using Additional Logic Circuit -- 8.6 Asynchronous Clear, Preset and Load (JAM) in a Counter -- 8.7 Synchronous Clear, Preset and Load Facilities in a Counter -- 8.8 Timing Diagrams -- Chapter 9: Fundamental Mode Sequential Circuits -- 9.1 General Asynchronous Sequential Circuit -- 9.2 Unstable Circuit Operation -- 9.3 Stable Circuit Asynchronous Mode Operation -- 9.4 Fundamental Mode Asynchronous Circuit -- 9.4.1 Tabular Representation of Excitation-cum-Transitions of States and Outputs -- 9.5 Analysis Procedure -- 9.5.1 Excitation Table -- 9.5.2 Transition Table -- 9.5.3 State Table -- 9.5.4 State Diagram -- 9.5.5 Flow Table -- 9.5.6 Example of an Excitation-cum-Transition Table -- 9.5.7 Flow Table from Excitation-Transition Table -- 9.5.8 Flow Diagram -- 9.6 Races -- 9.6.1 Cycles of the Races -- 9.7 Race-Free Assignments -- Chapter 10: Hazards and Pulse Mode Sequential Circuits -- 10.1 Hazards -- 10.1.1 Static-0 Hazard -- 10.1.2 Static-1 Hazard -- 10.2 Identifying Static Hazards…”
    Libro electrónico
  15. 13235
    Publicado 2024
    Tabla de Contenidos: “…-- 1.1.4 History of IoT -- 1.1.5 About Things in IoT -- 1.1.6 About the Internet in IoT -- 1.2 Characteristics of IoT -- 1.3 IoT Architectures -- 1.3.1 Functional Building Blocks of IoT -- 1.3.2 Physical Design of IoT -- 1.3.3 Logical Design of IoT -- 1.4 Communication Models and APIs -- 1.4.1 Request-Response Communication Model -- 1.4.2 Publish-Subscribe Communication Model -- 1.4.3 Push-Pull Communication Model -- 1.4.4 Exclusive Pair Communication Model -- 1.5 Enabling Technologies in IoT -- 1.5.1 The Identifiers in IoT -- 1.5.2 IoT Frameworks and Its Design Ethics -- 1.6 Toward the Internet of Things Applications -- 1.6.1 Strategic Research and Innovation Directions -- 1.6.2 IoT Smart X Applications -- 1.7 Challenges and Open Research Issues in IoT -- 1.7.1 Security and Privacy Issues in IoT -- 1.7.2 Tackling Jamming Attacks in IoT -- 1.7.3 Encryption -- 1.7.4 Privacy Challenges and Their Solutions in IoT -- 1.7.5 Design and Development Challenges -- 1.7.6 Securing IoT Using Blockchain Technology -- References -- Chapter 2 Things in the Internet of Things -- 2.1 Sensors and Actuators in IoT -- 2.1.1 Case Studies: RFID Principles, Components, and Applications -- 2.2 Pillars of Embedded IoT and Physical Devices -- 2.2.1 Machine-to-Machine -- 2.2.2 IoT and M2M -- 2.2.3 Software-Defined Networking -- 2.2.4 Wireless Sensor Networks -- 2.2.5 SCADA -- 2.3 Wireless Sensor Networks -- 2.3.1 History and Context -- 2.3.2 Connecting Nodes -- 2.3.3 Networking Nodes -- 2.3.4 WSN and IoT -- 2.4 Two Pillars of the Web: Web of Things and Cloud of Things…”
    Libro electrónico
  16. 13236
    Publicado 2020
    “…Drawing feminist theory into conversation with peace studies and improvisation theory, it advocates for peace- building opportunities to transform culture and for the improvisatory resources of 'culture- jamming' as a mechanism to dismantle rape culture. …”
    Libro electrónico
  17. 13237
    Publicado 2011
    “…Coverage of each application is jam-packed with information and tips that not only explain HOW to perform a task, but WHY you need this procedure and WHEN it's best to use it. …”
    Libro electrónico
  18. 13238
  19. 13239
  20. 13240