نتایج جستجو برای: random key representation

تعداد نتایج: 1030562  

Journal: :Advances in Applied Mathematics 2017

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

Journal: :مهندسی عمران فردوسی 0
محمد حسن سبط محمدرضا افشار یعقوب علیپوری

in this paper, a fully informed particle swarm (fips) algorithm is proposed for solving the multi-mode resource-constrained project scheduling problem (mrcpsp) with minimization of project makespan as the objective subject to resource and precedence constraints. in the proposed fips, a random key and the related mode list (ml) representation scheme are used as encoding schemes and the multi-mod...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده روانشناسی و علوم تربیتی 1391

the purpose of this study was the relationship between problem – solvi ability with fdi cognitive style of students.the research method was correlation method. for data analysis pearson test was used. statistical society in this research was all the students of alligoodarz city in 1391-92 year.to sampling of statiscal population was used sampling multi-stage random the size of sample selected 2...

Journal: :iranian journal of biotechnology 2014
javad mohammadzadeh mohammad ganjtabesh abbas nowzari-dalini

background: rna plays key role in many aspects of biological processes and its tertiary structure is critical for its biological function. rna secondary structure represents various significant portions of rna tertiary structure. since the biological function of rna is concluded indirectly from its primary structure, it would be important to analyze the relations between the rna sequences and t...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

Journal: :Journal of Computer Science 2006

2012
Christian S. Rodrigues CHRISTIAN S. RODRIGUES

We systematically investigate the problem of representing Markov chains by families of random maps, and what regularity of these maps can be achieved depending on the properties of the probability measures. Our key idea is to use techniques from optimal transport to select optimal such maps. Optimal transport theory also tells us how convexity properties of the supports of the measures translat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید