نتایج جستجو برای: most efficient

تعداد نتایج: 1828312  

2014
Ramandeep kaur Jitender Sharma

Today, communication is main part of everybody’s life. Security is the most important issue in any communication. So we need a secured system to exchange data securely between users. For this purpose of security there are various techniques like cryptography, watermarking and steganography. Steganography is used to transmit information in covered form. In steganography we hide the presence of d...

Journal: :Int. Journal of Network Management 2009
Damien Leroy Olivier Bonaventure

The difficulty of renumbering a network – i.e., adding and removing an IP prefix due to a provider change or a network merging – is a real issue for most network administrators. It is even considered by a lot of people as a bottleneck issue in adopting Provider Aggregatable addressing for IPv6. In this paper, we propose a set of macros that can be used in configuration files to permit network a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده جغرافیا 1392

the west of esfahan province, iran, is one of the most important agricultural areas throughout the country due to the climate variability and life-giving water of zayanderood river. rice is one of the major and economic crops in this area. the most important climatic elements in agricultural activities which should be considered include temperature, relative humidity, precipitation and wind. so...

Journal: :international journal of data envelopment analysis 2015
samira salehpour nazila aghayi

in this paper, a new revenue efficiency data envelopment analysis (re-dea) approach is considered for finding the most revenue efficient unit with price uncertainty in both optimistic and pessimistic perspectives. the optimistic and pessimistic perspectives use efficient frontier and inefficient frontier, respectively. an integrated model is introduced to find decision making units (dmus) that ...

Nazila Aghayi Samira Salehpour

    In this paper, a new revenue efficiency data envelopment analysis (RE-DEA) approach is considered for finding the most revenue efficient unit with price uncertainty in both optimistic and pessimistic perspectives. The optimistic and pessimistic perspectives use efficient frontier and inefficient frontier, respectively. An integrated model is introduced to find decision making units (DMUs) t...

Journal: :CoRR 2016
M. Hassan Najafi David J. Lilja

This work proposes a high-capacity scheme for separable reversible data hiding in encrypted images. At the sender side, the original uncompressed image is encrypted using an encryption key. One or several data hiders use the MSB of some image pixels to hide additional data. Given the encrypted image containing this additional data, with only one of those data hiding keys, the receiver can extra...

2017
Jie Hu Na Zhang Wenzhao Liu Juanjuan Shan

At present, fresh agricultural products have begun to take the scale of industrialization, the majority have been in full accordance with high yield and high quality, efficient and safe production requirements, but due to the characteristics of fresh agricultural products, more and more attention have been aroused, the traditional marketing model is facing a bottleneck, the various aspects of n...

2005
Matthias Ernst Ellen Jochemsz Alexander May Benne de Weger

We present several attacks on RSA that factor the modulus in polynomial time under the condition that a fraction of the most significant bits or least significant bits of the private exponent is available to the attacker. Our new attacks on RSA are the first attacks of this type that work up to full size public or private exponent.

2006
GEOFF A. BOXSHALL

Phylogenetic relationships between the known genera of the order Misophrioida permit the identi® cation of two lineages: one consisting of the family Misophriidae Brady, 1878 which comprises seven genera, and a new, monotypic family, the Palpophriidae Boxshall & Jaume, 1999; the other consisting of another new family, the SpeleophriidaeBoxshall & Jaume, 1999, comprising eight genera. Habitat ex...

2016
Barak Shani

This paper gives the first bit security result for the elliptic curve Diffie–Hellman key exchange protocol for elliptic curves defined over prime fields. About 5/6 of the most significant bits of the x-coordinate of the Diffie–Hellman key are as hard to compute as the entire key. A similar result can be derived for the 5/6 lower bits. The paper also generalizes and improves the result for ellip...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید