نتایج جستجو برای: unilateral authentication
تعداد نتایج: 74220 فیلتر نتایج به سال:
Stereo-matching solutions minimize disparity relative to the horopter (minimum-absolute-disparity or MAD), and differences in disparity between adjacent features (minimum-relative-disparity or MRD). When placed in conflict, spatial proximity promotes MRD over MAD solutions. How does temporal proximity of neighboring features affect strength of these spatial interactions? We quantified the inter...
Certain pairs of visual patterns, when superimposed as if transparent, elicit a wavering percept in which one or the other pattern can enjoy temporary periods of exclusive visibility. This multistable perceptual phenomenon is called monocular rivalry or pattern rivalry (PR) and is most pronounced when the component patterns are faint and devoid of detail. The principal mechanisms that give rise...
Monocular rivalry was named by Breese in 1899. He made prolonged observation of superimposed orthogonal gratings; they fluctuated in clarity with either one or the other grating occasionally being visible alone. A year earlier, Tscherning observed similar fluctuations with a grid of vertical and horizontal lines and with other stimuli; we draw attention to his prior account. Monocular rivalry h...
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. The aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in Iran. In this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...
unilateral orchidectomy (uo) is required when further breeding potential is important. it is sometimes necessary to remove a single testis in a matured stallion for therapeutic reasons. in this study, twelve donkeys were used to evaluate three techniques of unilateral castration, histological and morphological changes on the remaining testis. results of the study showed that each of the surgica...
The purpose of this paper is to present the design for providing security and higher authentication scheme for executing secure data transaction in an Organization field over Internet. There has been incessant change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. Authentication schemes that involve more than single level for authent...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید