نتایج جستجو برای: intelligent protection
تعداد نتایج: 254231 فیلتر نتایج به سال:
Efficient cryptographic architectures are used extensively in sensitive smart infrastructures. Among these architectures are those based on stream ciphers for protection against eavesdropping, especially when these smart and sensitive applications provide life-saving or vital mechanisms. Nevertheless, natural defects call for protection through design for fault detection and reliability. In thi...
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorability is proposed. The function of this framework is to prevent the destruction from malicious intentions by integrating the technologies of information hiding, encryption, monitoring, self-adaptation and fast inferenc...
| Unequal error protection codes that are designed using trellis coded modulation are proposed for use with intelligent communication systems, where the transmitted data consists of a random mixture of important and less important information. To achieve unequal error protection, the proposed scheme encodes the data by randomly switching between two codes which use di erent signal constellation...
In this paper, a new information architecture for real-time data exchange between intelligent products and back-end systems is presented. As intelligent products that are capable of recording data about their surroundings become part of daily life, privacy protection must be addressed. Use-cases detailing different security requirements are presented, and issues related to the secure transfer o...
Traditional optical networks are gradually evolving towards intelligent optical networks due to the need for faster bandwidth provisioning, protection and restoration of the network that can be accomplished with devices like optical switch, add drop multiplexer and cross connects. Since dense wavelength multiplexing forms the physical layer for intelligent optical networking, the roll of high s...
Critical Infrastructure Protection (CIP) faces increasing challenges in number and in sophistication, which makes vital to provide new forms of protection to face every day’s threats. In order to make such protection holistic, covering all the needs of the systems from the point of view of security, prevention aspects and situational awareness should be considered. Researchers and Institutions ...
Energization of a transformer results in sudden flow of current which is an effect of core magnetization. This current will be dominated by the presence of second harmonic, which in turn is used to segregate fault and inrush current, thus guaranteeing proper operation of the relay. This additional security in the relay sometimes obstructs or delays differential protection in a specific scenario...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید