نتایج جستجو برای: unilateral authentication

تعداد نتایج: 74220  

Journal: :Vision Research 2004
Zhi-Lei Zhang Christopher Cantor Tandra Ghose Clifton M. Schor

Stereo-matching solutions minimize disparity relative to the horopter (minimum-absolute-disparity or MAD), and differences in disparity between adjacent features (minimum-relative-disparity or MRD). When placed in conflict, spatial proximity promotes MRD over MAD solutions. How does temporal proximity of neighboring features affect strength of these spatial interactions? We quantified the inter...

Journal: :Journal of vision 2005
Alexander Maier Nikos K Logothetis David A Leopold

Certain pairs of visual patterns, when superimposed as if transparent, elicit a wavering percept in which one or the other pattern can enjoy temporary periods of exclusive visibility. This multistable perceptual phenomenon is called monocular rivalry or pattern rivalry (PR) and is most pronounced when the component patterns are faint and devoid of detail. The principal mechanisms that give rise...

2017
Robert P. O’Shea Urte Roeber Nicholas J. Wade

Monocular rivalry was named by Breese in 1899. He made prolonged observation of superimposed orthogonal gratings; they fluctuated in clarity with either one or the other grating occasionally being visible alone. A year earlier, Tscherning observed similar fluctuations with a grid of vertical and horizontal lines and with other stimuli; we draw attention to his prior account. Monocular rivalry h...

F. Naji Mohades M. H. Yaghmaee Moghadam

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

Mohammad Reza Joharchi Mohammad Sadegh Amiri,

identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. The aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in Iran. In this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...

Journal: :veterinary research forum 2013
magda mahmoud ali omar khaled mohamed ahmed hassanein abdel-razek khalifa abdel-razek haroon ali yousef hussein

unilateral orchidectomy (uo) is required when further breeding potential is important. it is sometimes necessary to remove a single testis in a matured stallion for therapeutic reasons. in this study, twelve donkeys were used to evaluate three techniques of unilateral castration, histological and morphological changes on the remaining testis. results of the study showed that each of the surgica...

2014
M. S. Deshmukh

The purpose of this paper is to present the design for providing security and higher authentication scheme for executing secure data transaction in an Organization field over Internet. There has been incessant change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. Authentication schemes that involve more than single level for authent...

Journal: :Journal of Privacy and Confidentiality 2011

Journal: :Scholarpedia 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید