Showing 2,601 - 2,620 results of 4,172 for search 'prelacy~', query time: 2.00s Refine Results
  1. 2601
  2. 2602
  3. 2603
  4. 2604

    Vanesia (Saint-Jean-Poutge, Gers) : une mutatio aquitaine de l’Itinéraire de Bordeaux à Jérusalem by Fabien Colleoni

    Published 2016-12-01
    “…This article reports on the findings of the programmed excavation of the Vanesia relay station, established in the Baïse plain, after which it was named. …”
    Get full text
    Article
  5. 2605
  6. 2606
  7. 2607

    Secure Transmission Based on Antenna Selection for Network Coding System by Dan Deng, Ming Zhao, Guizhou Jian

    Published 2015-02-01
    “…The selection criteria for the source nodes and relay nodes were proposed over a slowly varying channel. …”
    Get full text
    Article
  8. 2608

    Priority-based message forwarding and query processing in opportunistic wireless sensor network by Yong-xuan LAI, Zi-yu LIN

    Published 2014-03-01
    “…A priority-based algorithm called PBQ was proposed for the query forwarding and processing in opportunistic wireless sensor network.Through the user-defined query priorities,the proposed algorithm properly selects the relay nodes and controlls the forwarding and the amount of messages.Meanwhile,the query priorities were adjusted dynamically so that the query results could be forwarded back to the source node of the query quickly and the residual query request messages could be cleaned up from the network,saving lots of unnecessary transmissions and improving the overall utility of query processing.Simulating results show that PBQ could effectively improve the success rate of queries,and reduce the cost and delay of query processing in opportunistic wireless sensor network.…”
    Get full text
    Article
  9. 2609

    Cryptanalysis of a hybrid-structured onion routing scheme by Long-hai LI, Shao-feng FU, Rui-dan SU, Xiang-quan CHE

    Published 2013-04-01
    “…SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.…”
    Get full text
    Article
  10. 2610

    Delay and energy minimization for MEC-based secure communication by Pinyi REN, Qian XU

    Published 2020-11-01
    “…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
    Get full text
    Article
  11. 2611
  12. 2612

    Research on secret key generation based on wireless channel characteristics in body area network by Jingjing HUANG

    Published 2021-12-01
    “…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
    Get full text
    Article
  13. 2613

    LTE D2D based vehicle networking communication architecture and data distributing strategy by Jun PENG, Dong MA, Kai-yang LIU, Qian-qian ZHANG, Xiao-yong ZHANG

    Published 2016-07-01
    “…Besides, a D2D cooperative relay-ing forward strategy under the constraint of latency for distributing multimedia streaming were proposed, which resulted in significant improvement of data transmission rate and network throughput.…”
    Get full text
    Article
  14. 2614
  15. 2615
  16. 2616

    Research on cognitive user pairing and cooperative sensing by Zhi-hua BAO, Shi-bing ZHANG, Xiao-ge ZHANG, Gong-an QIU

    Published 2012-01-01
    “…Aim at the shortages of the cooperative algorithm in sensing and time slot spent,an optimal cognitive users pairing and cooperative sensing algorithm was proposed.To achieve the best sensing performance,the pairing criterion was adopted where the one with the best receive SNR was used for the sense user and the one with the second-best receive SNR was used for the relay.According to optimizing cooperation threshold,non-cooperative or cooperative mode was selected,which made time slot spent much lower but sensing ability slight decreasing.Meanwhile,a lower bound of the detection probability and the time slot spent were derived in Rayleigh flat fading channels.Numerical results show the proposed algorithm has higher detection probability and lower time slot spent than the existing one.…”
    Get full text
    Article
  17. 2617

    ONG et Autorité Palestinienne : la « bonne gouvernance » dans un contexte de lutte nationale by Caroline Abu-Sada

    Published 2007-07-01
    “…As a means of avoiding state interference, some large aid recipients use their international benefactors to relay criticisms of the Palestinian Authority. The financial aid they providentially receive gives them enough status to pretend to a political role. …”
    Get full text
    Article
  18. 2618

    Entre éducation relative à l'environnement et éducation scientifique, quelles complémentarités ? by Anne Versailles

    Published 2003-10-01
    “…At a later stage, environmental education provides a new relay for efforts within an extended social network, making it possible to confront and therefore expand knowledge, skills and behaviour.…”
    Get full text
    Article
  19. 2619
  20. 2620