IET Communications covers the theory and practice of systems, networks and applications involving line, mobile radio, satellite and optical technologies for telecommunications, and Internet and multimedia communications. Topics include, but are not limited to: Applications of signal processing, equalisation,...
IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks. IET Networks is particularly interested in new ideas and superior solutions to the known and arising technological development bottlenecks at all levels of netwo...
It is followed by an analysis of FID's impact on the three-stage current protection scheme in flexible interconnected distribution networks, conducted through theoretical calculations in MATLAB and simulations in PSCAD/EMTDC. A quantitative assessment of the mal-operation and non-operation of current ...
These networks are comprised of interconnected sensors capable of detecting environmental changes, including alterations in temperature, humidity, and the presence of smoke or flames. To enable forest monitoring, various Internet of Things (IoT) methodologies have been introduced, many of which have ...
Active arc suppression device based on voltage-source convertor with consideration of line impedance in distribution networks Fan, BishuangMa, HaihangWang, WenYao, GanzhouLi, QikaiZeng, XiangjunGuerrero, Josep M. 2585-2596 Stabilization of DC-DC buck converter with unknown constant power load via pas...
QoS-aware downlink radio resource management in OFDMA-based small cells networks 机译: Aghababaiyan Keyvan,Maham Behrouz, IET communications 2018 原文传递 原文传递并翻译 示例 加入购物车 收藏 分享 22 Analysis of security performance of relay selection in underlay cognitive networks 机译: Khuon...
【24hr】Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks 包量 机译 适用于容忍延迟/中断的网络的公钥基础结构验证和撤销机制 作者:Muhammad Nasir Mumtaz Bhutta;Haitham Cruickshank;Zhili Sun; 刊名:Information Security, IET 2017年第1期 摘要:Public...
Computer Networks and Communications2023Q2 Computer Science Applications2020Q3 Computer Science Applications2021Q2 Computer Science Applications2022Q2 Computer Science Applications2023Q2 Electrical and Electronic Engineering2020Q2 Electrical and Electronic Engineering2021Q2 ...
Covert communication, also known as low probability of detection (LPD) communication, is regarded as the first barrier to defend privacy security in wireless networks. In the typical covert communications scenario, a warden Willie monitors the environment to decide whether transmitter Alice is ...
Modern power grids heavily rely on computers and networks, rendering them vulnerable to cyber-attacks, which can have significant negative impacts on the stability and security of the power system. Adversaries can use techniques such as channel jamming or tampering with transport protocols to introduce...