نتایج جستجو برای: mac method
تعداد نتایج: 1654775 فیلتر نتایج به سال:
End-tidal anaesthetic concentrations at first eye opening in response to a verbal command during recovery from anaesthesia (MAC-awake), were measured for isoflurane (n = 16), enflurane (n = 16) and halothane (n = 14). MAC-awake was measured during either slow or fast alveolar washout. Slow washout was obtained by decreasing anaesthetic concentrations in predetermined steps of 15 min, assuming e...
We present three security claims for iterated MAC functions. Next, we propose Alred, a construction method for MAC functions based on a block cipher that has provable security in the absence of internal collisions. We apply this construction to AES resulting in two MAC functions: Alpha-MAC and Pelican. We provide a model for describing different types of internal collisions in Alred and provide...
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
In this paper, we propose an efficient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). We can successfully recover the equivalent key of H2-MAC in about 2n/2 on-line MAC queries and 2n/2 off-line hash computations with great probability. This attack shows that t...
In this work, channel decoding is considered as a promising way for improvement of cryptographic functions. Use of MAC/H-MAC values and digital signatures is analyzed in a context of code concatenation, together with convolutional codes using MAP decoding algorithm. Soft Input Decryption method, which uses L-values from channel decoder, presents an efficient method for integrating cryptography ...
A new method for generating the stem components of Multiple Alternate Choice (MAC) test items is proposed which makes use of a theory about causal coherence relation primitives. A trial of the Causal Relation Explication, Addition and Manipulation (CREAM) method is described which uses a domain specific evaluation method. The domain expert assigns a usability category to each MAC stem from a ba...
زمینه و هدف: حمل دستی بار از جمله وظایفی است که میتواند سبب ایجاد اختلالات اسکلتی- عضلانی مرتبط با کار گردد و یکی از رایجترین اختلالات ناشی از حمل دستی بار، کمردردهای شغلی است. مطالعه حاضر به منظور تعیین میزان ناراحتیهای اسکلتی- عضلانی، ارزیابی وظایف حمل دستی بار با دو روش mac و معادله niosh و مقایسه نتایج این دو روش، انجام گرفت. روش بررسی: این مطالعه توصیفی- تحلیلی در سال 1390 بر روی 30 ک...
introduction: allogeneic hematopoietic stem cell transplantation (hsct) has been reported to be a successful curative treatment in aml patients. myeloablative conditioning (mac) is used more frequent as a preparing regimen. this study attempts to compare the outcome of patients who has received mac and reduced- intensity conditioning (ric). methods: totally, 618 patients with aml underwent hsct...
We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance about the correct execution of target programs at run-time. Monitoring and checking is performed based on a formal speci cation of system requirements. MaC bridges the gap between formal veri cation, which ensures the correctness of a desi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید