نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

Journal: :avicenna journal of phytomedicine 0
mohammad reza joharchi ferdowsi university of mashhad, mashhad, i. r. iran mohammad sadegh amiri department of biology, payame noor university, tehran, i. r. iran

identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. the aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in iran. in this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

, ,

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

Journal: :Fluids 2021

The prediction of scour evolution at bridge foundations is utmost importance for engineering design and infrastructures’ safety. complexity the scouring inherent flow field result separation generation multiple vortices further magnified due to dynamic interaction between movable bed throughout development a hole. In experimental environments, current approaches characterization rely mainly on ...

Journal: :amirkabir international journal of modeling, identification, simulation & control 2014
f. naji mohades m. h. yaghmaee moghadam

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

2009
Jacob K. Goeree

This paper reports results from social learning experiments where subjects choose between two options and each subject has a small chance of being perfectly informed about which option is correct. In treatment “sequence,” subjects observe the entire sequence of predecessors’ choices while in treatment “no-sequence” they only observe the number of times each option has been chosen. The theoretic...

Journal: :Government Information Quarterly 2021

To lay the foundation for special issue that this research article introduces, we present 1) a systematic review of existing literature on implications use Artificial Intelligence (AI) in public governance and 2) develop agenda. First, an assessment based 26 articles topic reveals much exploratory, conceptual, qualitative, practice-driven studies reflecting increasing complexities using AI gove...

Journal: :Statistica Sinica 2008
Yongchao Ge Stuart C Sealfon Terence P Speed

Benjamini and Hochberg (1995) proposed the false discovery rate (FDR) as an alternative to the familywise error rate (FWER) in multiple testing problems. Since then, researchers have been increasingly interested in developing methodologies for controlling the FDR under different model assumptions. In a later paper, Benjamini and Yekutieli (2001) developed a conservative step-up procedure contro...

2010
E. ROQUAIN

In the context of correlated multiple tests, we aim to nonasymptotically control the family-wise error rate (FWER) using resampling-type procedures. We observe repeated realizations of a Gaussian random vector in possibly high dimension and with an unknown covariance matrix, and consider the oneand two-sided multiple testing problem for the mean values of its coordinates. We address this proble...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید