Essays about: "access layer"
Showing result 21 - 25 of 160 essays containing the words access layer.
-
21. Decode and Forward Relay Assisting Active Jamming in NOMA System
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE
-
22. API data gathering and structuring for machine learning and human use : Optimizing API data for both financial machine learning and being easy to read and use by the end user
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis looks into how to implement an abstraction layer between transaction data gathered from Revised Payment Services Directive (PSD2) compliant banks via an Application Programming Interface (API) and a data base, with a human user interface for reading and structuring the data. API for data sources tend to not have a standardized structure and this creates a problem for machine learning. READ MORE
-
23. Smart contracts for secure vehicular sharingaccess systems using blockchain technologies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Ongoing research suggests decentralized solutions based on blockchain for vehicle sharing scenario, to solve the fairness and privacy violation issues in centralized platforms. Users can transfer funds and execute decentralized applications, called smart contracts, in these blockchainbased platforms. READ MORE
-
24. A Study on Data-driven Methods for Selection and Evaluation of Beam Subsets in 5G NR
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : 5G New Radio is the next generation of mobile networks and it comes with promises of ultra-high speeds, ultra-high reliability and ultra-low latency. This has posed a challenge for the engineers entrusted with the task of finding solutions which could fulfil the specification, and as a result, some promising areas have received increased attention in recent years. READ MORE
-
25. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments
University essay from Uppsala universitet/Signaler och systemAbstract : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. READ MORE