نتایج جستجو برای: rate equivocation

تعداد نتایج: 960563  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده مهندسی شیمی و نفت 1391

برای اطمینان از درستی کارکرد فرآیند های صنعتی، نیاز به ابزارهایی هست که وضعیت های نامطلوب عملکرد فرآیند را با دقت و سرعت بالا به راهبر فرآیند نشان دهد. یک روش موثر برای تشخیص و ردیابی عیوب، به کاهش اثر این عیوب، تأمین ایمنی عملیات، کم کردن عدم زمان کارکرد و کاهش هزینه های بازسازی کمک می کند. در حال حاضرbayesian belief networks (bbns) از جمله روش های مورد توجه جهت تعیین و تشخیص عیوب فرآیندها به ...

Journal: :Des. Codes Cryptography 2014
Zhuojun Zhuang Bin Dai Yuan Luo A. J. Han Vinck

Relative dimension/length profile (RDLP), inverse relative dimension/length profile (IRDLP) and relative length/dimension profile (RLDP) are equivalent sequences of a linear code and a subcode. The concepts were applied to protect messages from an adversary in the wiretap channel of type II with illegitimate parties. The equivocation to the adversary is described by IRDLP and upper-bounded by t...

2008
Chan Wong Wong John M. Shea Tan F. Wong

Consider a wireless communication system in which Alice wishes to transmit a message to Bob in the presence of an eavesdropper, Eve. We consider the design of a communication technique that allows Alice to send a message such that Bob can decode it but Eve can get little information about the message. This scenario is a classic example of the wiretap channel, for which several researchers have ...

Journal: :CoRR 2016
Hamid G. Bafghi Babak Seyfe Mahtab Mirmohseni Mohammad Reza Aref

In this paper we consider the State-Dependent Wiretap Channel (SD-WC). As the main idea, we model the SD-WC as a Cognitive Interference Channel (CIC), in which the primary receiver acts as an eavesdropper for the cognitive transmitter’s message. By this point of view, the Channel State Information (CSI) in SD-WC plays the role of the primary user’s message in CIC which can be decoded at the eav...

Journal: :CoRR 2009
Li-Chia Choo Kai-Kit Wong

In this paper, bounds to the secrecy capacity region for the general 3-receiver broadcast channel with 3 degraded message sets, are presented for confidential messages sent to be kept secret from one of the receivers. This model is a more general model than 2-receiver broadcast channels with confidential messages with an external wiretapper, and recently studied 3-receiver degraded broadcast ch...

Journal: :Physical Communication 2021

Finite-length codes are learned for the Gaussian wiretap channel in an end-to-end manner assuming that communication parties equipped with deep neural networks (DNNs), and communicate through binary phase-shift keying (BPSK) modulation scheme. The goal is to find via DNNs which allow a pair of transmitter receiver reliably securely presence adversary aiming at decoding secret messages. Followin...

Journal: :Philosophical Studies 2021

Abstract Two striking claims are advanced on behalf of the free energy principle (FEP) in cognitive science and philosophy: (i) that it identifies a condition possibility existence for self-organising systems; (ii) has important implications our understanding how brain works, defining set process theories—roughly, theories structure functions neural mechanisms—consistent with minimising imperat...

پایان نامه :0 1392

nowadays in trade and economic issues, prediction is proposed as the most important branch of science. existence of effective variables, caused various sectors of the economic and business executives to prefer having mechanisms which can be used in their decisions. in recent years, several advances have led to various challenges in the science of forecasting. economical managers in various fi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - پژوهشکده مهندسی فرایند 1395

abstract: mineral scaling in oil and gas production equipment is one of the most important problem that occurs while water injection and it has been recognized to be a major operational problem. the incompatibility between injected and formation waters may result in inorganic scale precipitation in the equipment and reservoir and then reduction of oil production rate and water injection rate. ...

Journal: :IACR Cryptology ePrint Archive 2000
Gideon Samid

To a cryptographer the claim that “Shannon Security was achieved with keys smaller than the encrypted message" appears unworthy of attention, much as the claim of “perpetuum mobile” is to a physicist. Albeit, from an engineering point of view solar cells which power satellites exhibit an “essential perpetuum mobile” and are of great interest. Similarly for Shannon Security, as it is explored in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید