نتایج جستجو برای: confidential self
تعداد نتایج: 531047 فیلتر نتایج به سال:
We show that the capacity region of the broadcast channel with confidential messages does not change when the strong security criterion is adopted instead of the weak security criterion traditionally used. We also show a construction method of coding for the broadcast channel with confidential messages by using an arbitrary given coding for the broadcast channel with degraded message sets.
The amount of data that is being produced has increased rapidly so has the various data mining methods with the aim of discovering hidden patterns and knowledge in the data. With this has raised the problem of confidential data being disclosed. This paper is an effort to not let those confidential data be disclosed. We apply constrained nonnegative matrix factorization (NMF) in order to achieve...
We study the frequency-selective broadcast channel with confidential messages (BCC) where the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a block transmission of N symbols followed by a guard interval of L symbols, the frequency-selective channel can be modeled as a N × (N + L) Toeplitz matrix. For this special type of multipl...
Several security models of multiple-access channel (MAC) are investigated. First, we study the degraded MAC with confidential messages, where two users transmit their confidential messages (no common message) to a destination, and each user obtains a degraded version of the output of the MAC. Each user views the other user as a eavesdropper, and wishes to keep its confidential message as secret...
In this paper, a practical wireless transmission scheme is proposed to transmit confidential messages to the desired user securely and precisely by the joint use of multiple tools including artificial noise (AN) projection, phase alignment (PA)/beamforming, and random subcarrier selection (RSCS) based on OFDM, and directional modulation (DM), short for RSCS-OFDM-DM. This RSCS-OFDM-DM scheme pro...
BACKGROUND We examined reports to a primary care, ambulatory, patient safety reporting system to describe types of errors reported and differences between anonymous and confidential reports. METHODS Applied Strategies for Improving Patient Safety (ASIPS) is a demonstration project designed to collect and analyze medical error reports from clinicians and staff in 2 practice-based research netw...
Discrete memoryless interference and broadcast channels in which independent confidential messages are sent to two receivers are considered. Confidential messages are transmitted to each receiver with perfect secrecy, as measured by the equivocation at the other receiver. In this paper, we derive inner and outer bounds for the achievable rate regions for these two communication systems.
OBJECTIVE The objective of this research was to identify retrospectively the alienating behaviors and the parental bonding that occurred in an Italian sample of adults whose had parents separated or divorced and their associations with self-esteem and psychological distress. METHODS Four hundred seventy adults in Chieti, Italy, completed an anonymous and confidential survey regarding their ch...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید