نتایج جستجو برای: distance relay
تعداد نتایج: 254950 فیلتر نتایج به سال:
Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining the node's rejection to relay traffic. The objective of this paper is to propose a novel model tha...
Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of inconsistent data, let alone coming from diverse intelligent electronic devices (IEDs). Thus, a novel Rough-Set-based data mining strategy has been formulated to resolve the inconsistency in a distance protective relay’s decision system (i.e. a transformed rel...
As Alice inserts her card, Bob sends a message to his accomplice, Carol, who is about to pay $2 000 for a expensive diamond ring at honest Dave’s jewellery shop. Carol inserts a counterfeit card into Dave’s terminal. This card is wired to a laptop in her backpack, which communicates with Bob’s laptop using mobile phones. The data to and from Dave’s terminal is relayed to the restaurant’s counte...
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover i...
Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining the node's rejection to relay traffic. The objective of this paper is to propose a novel model tha...
This study proposes an intelligent protection relay design that uses artificial neural networks to secure electrical parts in power infrastructure from different faults. Electrical transformer and transmission lines are protected using differential distance relay, respectively. Faults categorized, their locations pinpointed three-phase current values zero-current characteristics differentiate b...
Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers’ outputs have recently been put forward. In this extended abstract, we survey some of these security concerns and attempt to incorp...
For the distance protection applied in converter-interfaced renewable energy systems, various AC fault ride-through strategies of sources will cause a large phase difference between operating current relay and current, resulting mal-operation relay. To overcome this issue, paper proposes an active control for systems to enhance reliability This scheme firstly calculates by only using local meas...
Relaying is supposed to be a low energy consumption technique since the long distance transmission is divided into several short distance transmissions. When the power consumptions (PCs) other than that consumed by transmitting information bits is taken into account, however, relaying may not be energy efficient. In this article, we study the energy efficiencies (EEs) of one-way relay transmiss...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید