Internal P-set and Security Transmission- identification of Information

نویسنده

  • Xiu-qing Yu
چکیده

P-sets (packet sets) is a pair of sets composed of internal P-set and outer P-set, and it has dynamic characteristics. Based on internal P-set, several concepts such as F -internal contained information, F -internal contained dependence, and F -internal remainder information, are presented. In addition, existing theorem, single-dependence transmission theorem, and attribute dependence theorem about F -internal contained information are proposed. To express the dynamic degree of varying of F -internal contained information, the concepts of F -internal contained coefficient and F -internal contained degree are given. Furthermore, discovery-identification principle of F -internal contained information is provided. An algorithm of information transmission-identification is given. At the end, the feasibility of the algorithm is illustrated by an example.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Telepathic Communication Generation using Nano Fiber Ring

The communication security is set up by registration during the first beliefand get in touch between two human beings. The safety codes among them aregenerated and the records are blocked by these protection codes if the end user is not therequired one. On the other hand, the unlocked records are transmitted if the required enduser is confirmed by the feedback brain signals via the comments min...

متن کامل

Identification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company

The purpose of this study is to identify and prioritize the effective technical and technical stress factors of information security by IT experts identified in Aghajari oil and gas Exploitation Company. The statistical population of the study consisted of 100 ICT managers and experts in Aghajari Oil and Gas Co. which directly related to the security of information in the company, 80 of them we...

متن کامل

Molecular identification and antifungal susceptibility of Candida albicans isolated from Vulvovaginitis Candidiasis

Vulvovaginal candidiasis is caused by the increasing number of Candida species as normal flora in the vagina. To assess the transmission rout as well as to determine the suitable antifungal drugs for treatment, the exact identification of Candida species is crucial. Therefore, earlier detection of infection allows quick initiation of antifungal therapy with a greater probability for improved su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCP

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011