نتایج جستجو برای: leakage parameter
تعداد نتایج: 245023 فیلتر نتایج به سال:
CO2 modeling in a deep saline aquifer: a predictive uncertainty analysis using design of experiment.
When field data are limited, stratigraphic models are used instead of detailed, fully heterogeneous models (FHM) to represent deep saline aquifers in numerical simulations of CO2 storage. This study evaluates parameter sensitivity and prediction uncertainty of three stratigraphic models of decreasing complexity (i.e., facies, layered, formation) against that of a FHM. For select simulation outc...
We propose to revisit Side-channel Cryptanalysis from the point of view, for instance, of C. E. Shannon: The calculation of a posteriori probabilities is the generalized problem of cryptanalysis. So, our goal will be to provide analytic formulae for the marginal posterior probability mass functions for the targets of those attacks. Since we are concerned with the probabilities of single and per...
This paper shows a generic method of constructing CCAsecure public key encryption schemes with leakage resilience on the secret key. It is based on a new kind of universal2 hash proof system which accepts an auxiliary parameter. Specifically, two schemes are presented, basing on the DCR assumption and DLIN assumption respectively.
Leakage resilient codes (LRCs) are probabilistic encoding schemes that guarantee message hiding even under some bounded leakage on the codeword. We introduce the notion of fully leakage resilient codes (FLRCs), where the adversary can leak λ0 bits from the encoding process, namely, the message and the randomness involved during the encoding process. In addition the adversary can as usual leak f...
Leakage of air in tumble dryers is an important parameter regarding the energy efficiency drying process. In general, are prone to leakage, therefore further investigation and optimization this field great interest. This study investigates quantifies leakage within closed-loop system in-situ household heat pump dryer. Each potential location was characterized by curve obtained either isolated o...
Anastomotic leakage is still the most undesirable complication of colorectal surgery. The reported incidence anastomotic after surgery varies from 1.8% to 15.9%. impact increased morbidity, mortality (12–30%), length stay, and cost hospitalization; hence, this should be prevented as much possible.Several studies have shown a correlation between low albumin levels leakage.The Colon Leakage Score...
Non-Linear Recursive Parameter Estimation Applied to Fault Detection and Diagnosis in Real Buildings
This paper describes a fault detection and diagnosis scheme based on parameter estimation and presents results from its application to a cooling coil subsystem in a real building. A non-linear adaptation of the Prediction Error Forgetting (PEF), algorithm is employed to estimate the parameters of a simple, steady-state, first principles based cooling coil model. A steady-state detector is used ...
Security parameters and attack countermeasures for Lattice-based cryptosystems have not yet matured to the level that we now expect from RSA and Elliptic Curve implementations. Many modern Ring-LWE and other lattice-based public key algorithms require high precision random sampling from the Discrete Gaussian distribution. The sampling procedure often represents the biggest implementation bottle...
The technical focus of drilling operations is changing to oil and gas reservoirs with higher difficulty factors such as low permeability fracture. During the process, in deep complex formations are prone overflow leakage complications. Leakage problems will change performance fluid wellbore, impacting wellbore pressure, causing accidents stuck collapse. In order improve level control over risk ...
We present a universal framework for tamper and leakage resilient computation on a von Neumann Random Access Architecture (RAM in short). The RAM has one CPU that accesses a storage, which we call the disk. The disk is subject to leakage and tampering. So is the bus connecting the CPU to the disk. We assume that the CPU is leakage and tamper-free. For a fixed value of the security parameter, th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید