نتایج جستجو برای: signature

تعداد نتایج: 65887  

Gastric cancer (GC) is one of the most common types of cancer and the second leading cause of cancer-associated mortality. Identification of novel biomarkers is critical to prolonging patient survival. MicroRNAs (miRNAs) proved to play diverse roles in the physiological and pathological state in cancers including GC. Herein we were aimed at performing a meta-analysis on miRNA profiling studies ...

Mehdi Abadi Sa'eed Jalili

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Journal: :journal of medical signals and sensors 0
saeid rashidi ali fallah farzad towhidkhah

with the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. therefore, fast and precise algorithms for the signature verification are very attractive. the goal of this paper is modeling of velocity signal t...

Journal: :international journal of environmental research 0

land cover change constitutes one of main way of alteration of soil organic matter in both quantitative and qualitative terms. the goal of this study was to compare the carbon stock and the isotopic signature of the organic matter in the soil of areas with different land use, covered with forest and grass (pasture). the study area is located at sorocaba, sp, brazil. using un-deformed soil sampl...

Journal: :amirkabir international journal of modeling, identification, simulation & control 2014
f. naji mohades m. h. yaghmaee moghadam

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...

راشدنیا, زهرا, صالحی‌کاخکی, احمد,

Stucco mihrabs are among valuable elements of Iranian architecture both in view of technique and of composition of patterns and inscriptions. They were crafted over a long period and are considered a valuable collection of designs and motifs either invented or inherited from past eras. The climax of the craft is considered to be during the Seljuq and early Timurid period, but dating remaining [...

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...

A. H. Zaeim A. Haji-Badali, R. Karami

When Einstein was thinking about the theory of general relativity based on the elimination of especial relativity constraints (especially the geometric relationship of space and time), he understood the first limitation of especial relativity is ignoring changes over time. Because in especial relativity, only the curvature of the space was considered. Therefore, tensor calculations should be to...

Journal: :the modares journal of electrical engineering 2011
shaho ghanei abdoreza rahmati

condition monitoring of bldc motors due to their important applications is gaining more and more significance. rotor eccentricity is one of the most important sources of faults in these motors. up to now, detection methods of this fault under nonstationary conditions are limited to complicated and time-consuming methods using wavelets and cohen class algorithms which are difficult to implement ...

In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید