نتایج جستجو برای: untrusted relay
تعداد نتایج: 19885 فیلتر نتایج به سال:
In this paper, we investigate the secrecy performance of nonorthogonal multiple access (NOMA) system in an untrusted relaying energy harvesting (UEH) network with multiple-input multiple-output (MIMO) architecture using maximum ratio transmission (MRT) and maximal combining (MRC) techniques. network, a source communicates users help composed components amplify-and-forward (AF) protocol. These r...
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server. Still, a key assumption in MDI-QKD is that the sources are trusted. We propose here a MDI quantum network with a single untrusted source. We have derived a complete proof of ...
Smart cards, having no user interface, are unable to communicate with the user directly. Communication is only possible with the aid of a terminal, which leads to several security problems. For example, if the terminal is untrusted (which is a very typical scenario), it may perform a man-in-the middle attack. I have created a formal model for dealing with untrusted terminals, and developed math...
in this paper, design and application of a new digital protective relay based on fuzzy logicand value estimation to a radial power system protection was presented. a novel approach based onvalue estimation was investigated for the proposed fuzzy logic based protective relay. in addition to thetheoretical aspect of fuzzy logic, mathematical definition of value estimation, detection andmeasuremen...
Machine-learned predictors, although achieving very good results for inputs resembling training data, cannot possibly provide perfect predictions in all situations. Still, decision-making systems that are based on such predictors need not only benefit from predictions, but should also achieve a decent performance when the inadequate. In this article, we propose prediction setup arbitrary metric...
This letter focuses on exploring a new decoding order to resolve the secrecy issue among untrusted non-orthogonal multiple access users. In this context, firstly, we identify total number of possible orders analytically. Then, propose strategy ensuring positive rate for all users, and obtain feasible secure based proposed numerically. Thereafter, present suboptimal policy avoid computational co...
In this paper, our objective is maximizing total sum-rate subject to power constraints on total relay transmit power or individual relay powers, for amplify-and-forward single-antenna relay-based wireless communication networks. We derive a closed-form solution for the total power constraint optimization problem and show that the individual relay power constraints optimization problem is a quad...
The nonlocal behavior of quantum mechanics can be used to generate guaranteed fresh randomness from an untrusted device that consists of two nonsignalling components; since the generation process requires some initial fresh randomness to act as a catalyst, one also speaks of randomness expansion. R. Colbeck and A. Kent [J. Phys. A 44, 095305 (2011)] proposed the first method for generating rand...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید