نتایج جستجو برای: distance relay

تعداد نتایج: 254950  

2017

Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining the node's rejection to relay traffic. The objective of this paper is to propose a novel model tha...

Journal: :Appl. Soft Comput. 2012
Mohammad Lutfi Othman Ishak Aris Mohammad Ridzal Othman Hairussaleh Osman

Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of inconsistent data, let alone coming from diverse intelligent electronic devices (IEDs). Thus, a novel Rough-Set-based data mining strategy has been formulated to resolve the inconsistency in a distance protective relay’s decision system (i.e. a transformed rel...

2007
Saar Drimer Steven J. Murdoch

As Alice inserts her card, Bob sends a message to his accomplice, Carol, who is about to pay $2 000 for a expensive diamond ring at honest Dave’s jewellery shop. Carol inserts a counterfeit card into Dave’s terminal. This card is wired to a laptop in her backpack, which communicates with Bob’s laptop using mobile phones. The data to and from Dave’s terminal is relayed to the restaurant’s counte...

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

Journal: :CoRR 2009
Pedro Peris-Lopez Julio César Hernández Castro Juan E. Tapiador Jan C. A. van der Lubbe

During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast majority of these protocols assume proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios, an intruder can be located between the prover (tag) and the verifier (reader) and trick the latter into thinking that the prover i...

2018

Ad hoc networks are formed by intermediate nodes which agree to relay traffic. The link between nodes is broken when a node rejects to relay traffic. Various parameters like depreciation in the energy of a node, distance between nodes and mobility of the nodes play a vital role in determining the node's rejection to relay traffic. The objective of this paper is to propose a novel model tha...

Journal: :Bulletin of Electrical Engineering and Informatics 2023

This study proposes an intelligent protection relay design that uses artificial neural networks to secure electrical parts in power infrastructure from different faults. Electrical transformer and transmission lines are protected using differential distance relay, respectively. Faults categorized, their locations pinpointed three-phase current values zero-current characteristics differentiate b...

2013
Ioana Boureanu Aikaterini Mitrokotsa Serge Vaudenay

Distance-bounding is a practical solution to be used in security-sensitive contexts, mainly to prevent relay attacks. But subtle security shortcomings related to the PRF (pseudorandom function) assumption and ingenious attack techniques based on observing verifiers’ outputs have recently been put forward. In this extended abstract, we survey some of these security concerns and attempt to incorp...

Journal: :International Journal of Electrical Power & Energy Systems 2022

For the distance protection applied in converter-interfaced renewable energy systems, various AC fault ride-through strategies of sources will cause a large phase difference between operating current relay and current, resulting mal-operation relay. To overcome this issue, paper proposes an active control for systems to enhance reliability This scheme firstly calculates by only using local meas...

Journal: :EURASIP J. Wireless Comm. and Networking 2012
Can Sun Chenyang Yang

Relaying is supposed to be a low energy consumption technique since the long distance transmission is divided into several short distance transmissions. When the power consumptions (PCs) other than that consumed by transmitting information bits is taken into account, however, relaying may not be energy efficient. In this article, we study the energy efficiencies (EEs) of one-way relay transmiss...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید