•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
Search 
  •   FUM Digital Library
  • Search
  •   FUM Digital Library
  • Search
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 52

    • Relevance
    • Title Asc
    • Title Desc
    • Year Asc
    • Year Desc
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
  • Export
    • CSV
    • RIS
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    On the Secrecy Capacity Region of Three-User Cognitive Multiple-Access Channels with Confidential Messages 

    Type: Journal Paper
    Author : امیر صنعی; قوشه عابدهدتنی; Amir Sonee; Ghosheh Abed Hodtani
    Year: 2017
    Abstract:

    and an outer bound on the secrecy capacity region, and second, prove that these bounds meet for a class of less noisy eavesdropping channels. Third, an inner bound on the secrecy capacity region of the Gaussian version of CMAC-CM known as GCMAC-CM is obtained...

    On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information 

    Type: Journal Paper
    Author : Amir Sonee and Ghosheh Abed Hodtani
    Publisher: IEEE
    Year: 2015
    Request PDF

    On the Secrecy Rate Region of Multiple-Access Wiretap Channel with Noncausal Side Information 

    Type: Journal Paper
    Author : امیر صنعی; قوشه عابدهدتنی; Amir Sonee; Ghosheh Abed Hodtani
    Year: 2015
    Abstract:

    secrecy constraints. Our work consists of four parts.

    (i) First, we consider the discrete memoryless (DM-MAC-WT) case of the model and derive inner and outer bounds on the secrecy capacity region under both of the secrecy constraints...

    On Secrecy Capacity of Gaussian Wiretap Channel Aided by A Cooperative Jammer 

    Type: Journal Paper
    Author : Lingxiang Li; Zhi Chen; Jun Fang
    Publisher: IEEE
    Year: 2014

    Semi-analytical performance analysis of FFH-OFDM with MMSE receiver 

    Type: Conference Paper
    Author : Oturak, A. , Ozturk, E.
    Publisher: IEEE
    Year: 2014

    Three-User Cognitive Multiple-Access Channels with Confidential Messages 

    Type: Conference Paper
    Author : امیر صنعی; قوشه عابدهدتنی; Amir Sonee; Ghosheh Abed Hodtani
    Year: 2016
    Abstract:

    Abstract—The two-user discrete memoryless cognitive

    multiple-access channel with confidential messages (DM-CMACCM)

    has been studied in the literature with a result for the

    secrecy capacity region. In this paper, we study a more...

    Action Localization with Tubelets from Motion 

    Type: Conference Paper
    Publisher: IEEE
    Year: 2014

    Determination of three-phase induction motors model parameters from catalog information 

    Type: Conference Paper
    Author : Guimaraes, J.M.C.; Bernardes, J.V.; Hermeto, A.E.; Bortoni, E.C.
    Publisher: IEEE
    Year: 2014

    A cluster-based load balancing algorithm in cloud computing 

    Type: Conference Paper
    Publisher: IEEE
    Year: 2014

    Testing market alternatives for renewable integration using a reduced network model 

    Type: Conference Paper
    Author : Price, J.E.
    Publisher: IEEE
    Year: 2014
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 6

    Author

    ... View More

    Publisher

    Year

    Keywords

    ... View More

    Type

    Language (ISO)

    Content Type

    Publication Title

    ... View More
    • About Us
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    DSpace software copyright © 2019-2022  DuraSpace