نتایج جستجو برای: sensitive synthetic schemes side

تعداد نتایج: 715793  

Journal: :Comput. Graph. Forum 2014
David Günther Joseph Salmon Julien Tierny

This paper introduces a novel, non-local characterization of critical points and their global relation in 2D uncertain scalar fields. The characterization is based on the analysis of the support of the probability density functions (PDF) of the input data. Given two scalar fields representing reliable estimations of the bounds of this support, our strategy identifies mandatory critical points: ...

2015
Mingdong Zhu Derong Shen Ling Liu Ge Yu

Locality Sensitive Hashing (LSH) is a popular method for high dimensional indexing and search over large datasets. However, little efforts have put forward to utilizing LSH in mobile applications for processing spatio-textual similarity queries, such as find nearby shopping centers that have a top ranked hair salon. In this paper, we present hybrid-LSH, a new LSH method for indexing data object...

2016
Nidhi Kiranbhai Parikh Madhav V. Marathe Samarth Swarup

Microsimulations focus on modeling routine activities of individuals and have been used for modeling and planning urban systems like transportation, energy demand, and epidemiology. On the other hand, planning for emergency situations (e.g., disasters) needs to account for human behavior which is not routine or pre-planned but depends upon the current situation like the amount of physical damag...

2015
Anamaria Costache Nigel P. Smart

The purpose of this paper is to compare side-by-side the NTRU and BGV schemes in their non-scale invariant (messages in the lower bits), and their scale invariant (message in the upper bits) forms. The scale invariant versions are often called the FV and YASHE schemes. As an additional optimization, we also investigate the affect of modulus reduction on the scale-invariant schemes. We compare t...

Journal: :Sustainability 2023

In this paper, we present a novel and effective fault detection diagnosis (FDD) method for wind energy converter (WEC) system with nominal power of 15 KW, which is designed to significantly reduce the complexity computation time possibly increase accuracy diagnosis. This strategy involves three significant steps: first, size reduction procedure applied training dataset, uses hierarchical K-mean...

Journal: :IEEE Transactions on Cloud Computing 2023

The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach sensitive data. Aiming at this concern, we present new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Control Markup Language (ABAC/XACML) model, client-side Ciphertext-Policy Encryption (CP-ABE) scheme, and cloud-side CFS service. Moreo...

Journal: :فصلنامه علمی پژوهشی گیاهان دارویی 0
m khaki ma sahari food technology department, college of agriculture, tarbiat modares university, tel: +98 – 21 – 48292328, fax: +98- 21- 48292200 m barzegar

background: essential oils of medicinal plants such as chamomile are very complex natural mixtures which can contain compounds at quite different concentrations and some of their components have antioxidant and antimicrobial activities in foodstuff. objective: the antioxidant and antimicrobial effects of chamomile essential oil in cake preparation were evaluated during 75 days of storage. metho...

Journal: :مجله دانشگاه علوم پزشکی کرمانشاه 0
ebrahim sajadi associated professor in pharmacognosy, isfahan university of medical sciences. gholamali naderi assistant professor in research center for cardiovascular disorders robab ziaee ph.d in pharmacognosy.

introduction: unsaturated fatty acids , one of the most important components of biological membranes , are very sensitive to oxidation processes. damage to cells and tissues by oxidation of these kinds of acids is one of the most important contributing  factors in many diseases, such as, atherosclerosis, rheumatoid arthritis and cancer. there are some available antioxidant synthetic compounds i...

2011
Euiseok Hwang James Bain Roger Wood

For emerging data storage systems, allowing errors during writing and correcting them by customized coding and signal processing during reading may provide higher customer densities than the conventional approach of trying to completely avoid write errors. Two high-density storage channels with write errors are investigated in this thesis; two-dimensional magnetic recording (TDMR) and advanced ...

Journal: :IEEE Transactions on Computers 2023

Secure processors with hardware-enforced isolation are crucial for secure cloud computation. However, commercial have underestimated the capabilities of attackers and failed to provide execution environments capable protecting sensitive information against side-channel attacks. Remote Attestation protocols based on traditional signature schemes not under attacks anymore since their secret keys ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید