نتایج جستجو برای: adversary fuzzy structure

تعداد نتایج: 1657955  

Journal: :international journal of business and development studies 0

this paper aims to evaluate the impact of several indices of market structure including entry to barrier, economies of scale and concentration degree on 140 active industries using the digit. accordingly, we apply three methods including cost disadvantages ratio ( ), herfindahl–hirschman concentration index ( ) and comanor and willson criterion in order to assess the economies of scale and usin...

2001
Stefan Dziembowski

In this thesis we study a problem of doing Verifiable Secret Sharing (VSS) and Multiparty Computations (MPC) in a model where private channels between the players and a broadcast channel is available. The adversary is active, adaptive and has an unbounded computing power. The thesis is based on two papers [CDD00, CDD99]. In [CDD00] we assume that the adversary can corrupt any set from a given a...

2005
Klaus Kursawe Felix C. Freiling

Adversary structures are a generalization of the classical “at most t-out-of-n” threshold failure model which is used in many published Byzantinetolerant protocols. An adversary structure basically lists all coalitions of parties whose corruption the protocol should tolerate. Using adversary structures it is possible to encode dependent failure models, such as “either all Linux machines fail or...

Journal: :journal of medical signals and sensors 0
zahra vahabi saeed kermani

unknown noise and artifacts present in medical signals with  non-linear fuzzy filter will be estimate and then removed. an adaptive neuro-fuzzy interference system which has a nonlinear  structure presented  for the noise function prediction by before samples. this paper is about a neuro-fuzzy method to estimate unknown noise of electrocardiogram (ecg) signal. adaptive neural combined with fuzz...

Abstract In this paper, a fuzzy PID with new structure is proposed to solve the load frequency control in interconnected power systems. in this study, a new structure and effective of the fuzzy PID-type Load frequency control (LFC) is proposed to solve the load frequency control in interconnected power systems. The main objective is to eliminate the deviations in the frequency of different area...

2010
Qiushi Yang Yvo Desmedt

We study perfectly secure message transmission (PSMT) from a sender S to a receiver R in the general adversary model. In this model, instead of being bounded by a threshold, the Byzantine adversary in a network is characterized by an adversary structure. By regarding monotone general access structures as linear codes, we introduce some new properties that allow us to design efficient PSMT proto...

Journal: :iranian journal of fuzzy systems 2004
kaoru hirota hajime nobuhara kazuhiko kawamoto shin-ichi yoshida

the pioneer work of image compression/reconstruction based onfuzzy relational equations (icf) and the related works are introduced. theicf regards an original image as a fuzzy relation by embedding the brightnesslevel into [0,1]. the compression/reconstruction of icf correspond to thecomposition/solving inverse problem formulated on fuzzy relational equations.optimizations of icf can be consequ...

2002
Ventzislav Nikov Svetla Nikova Bart Preneel Joos Vandewalle

A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure against active and mobile adversary. We consider a general access structure for the set of servers an...

Journal: :Theory of Computing 2010
Andris Ambainis

We present a new method for proving lower bounds on quantum query algorithms. The new method is an extension of the adversary method, by analyzing the eigenspace structure of the problem. Using the new method, we prove a strong direct product theorem for quantum search. This result was previously proved by Klauck, Špalek, and de Wolf (FOCS’04) using the polynomials method. No proof using the ad...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید