نتایج جستجو برای: phan privacy model
تعداد نتایج: 2140719 فیلتر نتایج به سال:
In the discipline of non-Newtonian materials, the ability to control viscoelastic stresses is very desirable in ascertaining important properties of the influenced materials. We apply the nonlinear geometric control theory to examine the controllability of various popular constitutive models with imposed homogeneous extensional flow. The subsequent constitutive laws considered here include the ...
Harn et al. proposed a series of Diffie-Hellman key exchange protocols which are integrated into Digital Signature Algorithm in 2004. Recently, Phan pointed out that Harn et al.’s protocols cannot provide forward secrecy and key freshness, which are two standard security attributes that key exchange protocols should have. Phan also gave his improvement. In this paper we present a better improve...
We give several examples to show that PA1 and IND-CCA2 together do not guarantee PA2 in the absence of random oracles, for both statistical and computational PA. In the statistical case, we use the Desmedt-Phan hybrid encryption scheme as the first example. If the DEM of the Desmedt-Phan hybrid encryption is an IND-CCA2 symmetric encryption without MAC, then the Desmedt-Phan hybrid is INDCCA2 a...
One of the most classical closures approximation of the FENE model of polymeric flows is the one proposed by Peterlin, namely the FENE-P model. We prove global existence of weak solutions to the FENE-P model. The proof is based on the propagation of some defect measures that control the lack of strong convergence in an approximating sequence. Using a similar argument, we also prove global exist...
Penelitian ini bertujuan untuk menganalisis kelayakan finansial waralaba bisnis franchise Phan di Kota Tarakan Data dianalisis dengan menggunakan kriteria investasi yaitu NPV, PI, IRR dan Payback Period. Hasil penelitian menunjukkan usaha secara ekonomi layak karena memiliki nilai NPV positif sebesar Rp.883.565.925,-. Profitabily Index 1,2 dimana bahwa tingkat keuntungan kali yang dikeluarkan. ...
For almost the last ten years, the agent-based modelling approach has allowed us to conceptualize and simulate an organized population of agents that have interactions among themselves and with their environment. In the social sciences, such an approach allows us to formalize complex situations with multiple scales (either spatial, temporal or organizational) and heterogeneous agents engaged in...
This paper describes a novel classification method for multistream conversational documents. Documents of contact center dialogues or meetings are often composed of multiple source documents that are transcriptions of the recordings of each speaker’s channel. To enhance the classification performance of such multi-stream conversational documents, three main advances over the previous method are...
The present study is an attempt to find out processual and functional aspects of privacy regulation in a dialectical investigation. For this purpose, 180 samples are selected from among mothers of families in Mashhad, Iran using random sampling. In this study, "meaning structure" method has been applied. Samples participated in Laddering Interview. Analyses are set in Content-Goal Table. Based ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید