نتایج جستجو برای: zero padding
تعداد نتایج: 150601 فیلتر نتایج به سال:
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message using the decryption exponent. This is the basis of several existing standards. In this paper we show how to build a secure padding scheme for signing arbitrarily long messages with a secure padding scheme for fixed-size...
Heel ulcers (HUs) are the second most common pressure ulcers (PUs). Despite the significant morbidity and economic cost associated with HUs, there remains a lack of understanding of the basic pathophysiology of PUs because of limited basic research. There are only sparse data regarding the efficacy of prevention aids such as heel padding devices, and these data are based mainly on epidemiologic...
Padding techniques are well-known from Computational Complexity Theory. Here, an analogous concept is considered in the context of existential second-order logics. Informally, a graph H is a padded version of a graph G, if H consists of an isomorphic copy of G and some isolated vertices. A set A of graphs is called weakly expressible by a formula ' in the presence of padding, if ' is able to di...
This paper proposes a new navigation modulation based on orthogonal frequency division multiplexing (OFDM). We derived the autocorrelation function and power spectral density of OFDM modulation. The influence cyclic prefix zero-padding is discussed. parameters signal performance was deeply analyzed, which can help designers choose parameters. main peak proposed narrow has good tracking accuracy...
There are few clear guidelines on the proper use of tourniquets in pediatric surgery, in particular on how to set the tourniquet pressure, how to select the most appropriate cuff, and whether to use some type of soft padding beneath the cuff for limb protection. The authors could find only one published study specifically addressing pediatric cuff pressures, and no studies showing what types of...
در این پایان نامه ما، گراف کلاس های هم ارزی مقسوم علیه های صفر یک حلقه جابجایی r را مطالعه می کنیم. در ادامه چگونگی دریافت اطلاعاتی درباره حلقه r از این ساختار را نشان می دهیم. به ویژه چگونگی شناسایی اول وابسته های حلقه r را به کمک گراف کلاس های هم ارزی مقسوم علیه های صفر آن تعیین می کنیم. ایده اصلی این پایان نامه از مقاله s. spiroff, c. wickham, a zero divisor graph determind by equivalence...
This paper considers systems for Traac Analysis Prevention (TAP) in a theoretical model. It considers TAP based on padding and rerouting of messages and describes the eeects each has on the diierence between the actual and the observed traac matrix (TM). The paper introduces an entropy-based approach to the amount of uncertainty a global passive adversary has in determining the actual TM, or al...
For the security of communication channels in today’s networks and encryption of messages therein, applications and their users rely on cryptographic protocols. These are supposed to provide confidentiality and integrity of message contents. They are relied upon by online shopping, banking, communication, scientific applications, and many others. Design errors in standard definition documents o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید