نتایج جستجو برای: untrusted relay
تعداد نتایج: 19885 فیلتر نتایج به سال:
In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR) nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC). In the CF-MAC, the TR nodes transmit their mes...
In this paper, we present a new approach for safe execution of untrusted programs. This approach is based on isolating the effects of untrusted program execution from the rest of the system. Isolation is achieved by intercepting and redirecting file modification operations made by the untrusted process so that they access a “modification cache” invisible to other processes in the system. To ens...
With the vigorous development of big data and 5G era, in process communication, number information that needs to be forwarded is increasing. The traditional end-to-end communication mode has long been unable meet modern people. Therefore, it particularly important improve success rate forwarding under limited network resources. One method opportunistic social networks select appropriate relay n...
The physical layer security (PLS) of millimeter wave (mmWave) communication systems is investigated, where the secure source-to-destination assisted by an untrusted relay selected from a group them and there are also several passive eavesdroppers (Eves) in network. In considered system model, while distributions relays Eves follow homogeneous Poisson Point Process (PPP). To maximize instantaneo...
in order to evaluate the effect of nitrogen absorption and use efficiency in relay intercropping for winter wheat and maize, a field experiment was conducted during 2008-2009 at the agricultural research station of ferdowsi university of mashhad, iran. a randomized block design with three replications was used. treatments included four combinations of relay intercropping of wheat and maize (thr...
This paper presents a novel impedance-based approach for out-of-step (OOS) protection of a synchronous generator. The most popular and commonly used approaches for detecting OOS conditions are based on the measurement of positive sequence impedance at relay location. However, FACTS devices change the measured impedance value and thus disrupt the performance of impedance-based relay function. In...
Polar codes, that have been recently introduced by Arikan, are one of the first codes that achieved the capacity for vast numerous channels and they also have low complexity in symmetric memoryless channels. Polar codes are constructed based on a phenomenon called channel polarization. This paper discusses relay channel polarization in order to achieve the capacity and show that if inputs of tw...
in this paper, an interval approach is presented to achieve perfect selectivity and maximum sensitivity in distance relay zones, considering uncertainties. for this purpose, first, the uncertainties affecting the settings of the three zones of a distance relay are discussed. then, by using the monte-carlo simulation, the uncertainties are modelled and the impedances seen by the distance relay a...
A number of Java environments run untrusted services as Java threads. However, Java threads may not be suitably secure for this task because of its problem with safe termination, resource control and thread isolation. These problem areas have been recognised by the research community and are comprehensively addressed in the not yet implemented Java Isolate API. Meanwhile, Java threads continue ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید