نتایج جستجو برای: dental leakages

تعداد نتایج: 162691  

Journal: :Information 2014
Susanne Durst Helio Aisenberg Ferenhof

In this paper, we look into knowledge leakages and ways to address them. It is conducted from the point of view of small and medium-sized enterprises (SMEs), as their specific attributes create unique challenges. Based on a discussion of the relevant fields, ways are presented in order to reduce the danger of knowledge leakages. In view of practitioners, the paper’s findings may enable an incre...

Journal: :IACR Transactions on Symmetric Cryptology 2017

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2020

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1390

in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...

Journal: :European Journal of Engineering Research and Science 2019

2016
Jarmo Nurmi Jouni Mattila

Leakages and valve faults are among the most common faults in hydraulic systems. This paper studies the real-time detection and isolation of certain leakage and valve faults based on the results obtained in part one. In the first part, the mathematical model of a hydraulic test bed was analyzed with Global Sensitivity Analysis to facilitate a systematic and verified approach to model-based cond...

2013
Guangjun Fan Yongbin Zhou Dengguo Feng

Yoneyama et al. introduces the Leaky Random Oracle Model at ProvSec2008 to capture the leakages from the hash list of a hash function used by a cryptography construction due to various attacks caused by sloppy usages or implementations in the real world. However, an important fact is that such attacks would leak not only the hash list, but also other secret states (e.g. the secret key) outside ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید