نتایج جستجو برای: hide characteristics
تعداد نتایج: 666265 فیلتر نتایج به سال:
abstract prediction of death anxiety on the basis of demographic characteristics and sp پیش بینی اضطراب مرگ براساس ویژگی های دموگرافیک و مولفه های معنویت در سالمندان به کوشش الهام حسن زهی معنویت از جمله مفاهیمی است که سالیان متمادی در حوزه روان شناسی جایگاه خود را یافته است پیشینه پژوهش نشان داده است که با متغیرهای فراوانی در روانشناسی در ارتباط بوده است. هدف از پژوهش حاضر این اس...
A key aspect of traffic classification is the early identification of individual flows which may utilise strategies such as ephemeral ports and transport later encryption to ‘hide’ on the network. This paper focuses on P2P and HTTP – the two main producers of network traffic – to determine the characteristics of their individual flows. We propose a heuristic based classification system to disti...
Based on transformation optics, we propose an illusion device that can make objects look much smaller and different than they actually are. In particular, the device has a capability to hide a large object (like an elephant) into a small one (like a matchbox). Compared to previous proposals for illusion devices, there is no requirement for negative refractive index or for spee...
With the advent of System-On-Chip (SOC) technology, there is a pressing need to enhance the quality of design tools available and increase the level of abstraction at which hardware is designed, implemented and programmed. This would reduce the gap between what is currently achievable technologically, and what hardware engineers are capable to produce given time to market constraints. Hardware ...
I present a factoring algorithm that factors N = U V , where U < V , provably in O(N 1/3+ǫ) time. I also discuss the potential for improving this to a sub-exponential algorithm. Along the way, I consider the distribution of solutions (x, y) to xy = N mod a. 1. Algorithm-hide and seek Let N be a positive integer that we wish to factor. Say N = U V where U and V are positive integers, not necessa...
Let N be a positive integer that we wish to factor. Say N = UV where U and V are positive integers, not necessarily prime, with 1 < U < V . For simplicity, assume V < 2U , so that V < (2N). The general case, without this restriction, will be handled at the end of this section. The idea behind the algorithm is to perform trial division of N by a couple of integers, and to use information about t...
Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...
We compare contrarian to conformist advice, a expert being one whose preference bias is against the decision-maker’s prior optimal decision. Optimality of an depends on characteristics information and learning. If either fully informed or fine can be acquired cheaply, then for symmetric distributions F state, (contrarian) superior if single peaked (bimodal). only coarse acquired, acquires more ...
Despite advances in detection, malware remains an active and high-risk threat to organizations. Understanding the characteristics of malware traffic can be vital in detecting, as well as responding to an incident inside an organization. In this paper, over 20,000 PCAPS generated by known malware are explored to find these characteristics. The focus of the research is on HTTP traffic since this ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید