نتایج جستجو برای: way algorithms

تعداد نتایج: 758206  

1998
Hans Dobbertin

In [1] it was shown that there are very effective attacks leading to collisions for the hash function MD4 designed by R. Rivest [3]. A summary of the status of hash functions of the MD4-family with respect to collision-resistence can be found in [2] and [4]. However, attacking the one-wayness of a hash function is a much more demanding challenge, and in case of success it has much more devastat...

Journal: :iranian journal of veterinary research 2011
m. ebrahimi

prolactin is mainly secreted by the anterior pituitary and is able to stimulate mammary gland development and lactation in mammalians. although prolactins share a common ancestral gene encoding, they show species specific characteristics and their efficiency may be different in various mammals. the importance of protein structures of all sequences of this hormone have been studied by various bi...

Journal: :international journal of industrial engineering and productional research- 0
parviz fattahi hamedan bahman ismailnezhad hamedan

in this paper, a stochastic cell formation problem is studied using queuing theory framework and considering reliability. since cell formation problem is np-hard, two algorithms based on genetic and modified particle swarm optimization (mpso) algorithms are developed to solve the problem. for generating initial solutions in these algorithms, a new heuristic method is developed, which always cre...

Journal: :international journal of smart electrical engineering 2012
setareh shafaghi reza sabbaghi-nadooshan

nowadays network-on-chips is used instead of system-on-chips for better performance. this paper presents a new algorithm to find a shorter path, and shows that genetic algorithm is a potential technique for solving routing problem for mesh topology in on-chip-network.

Journal: :journal of optimization in industrial engineering 2010
hassan shavandi

in this paper, we develop a capacitated location-covering model considering interval values for demand and service parameters. we also consider flexibility on distance standard for covering demand nodes by the servers. we use the satisfaction degree to represent the constraint of service capacity. the proposed model belongs to the class of mixed integer programming models. our model can be redu...

Journal: :international journal of pediatrics 0
amir jamshidnezhad department of health information technology, faculty of allied health sciences, ahvaz jundishapur university of medical sciences, ahvaz, iran. ahmad azizi department of health information technology, faculty of allied health sciences, ahvaz jundishapur university of medical sciences, ahvaz, iran. saeed shirali department of laboratory sciences, faculty of allied health sciences, ahvaz jundishapur university of medical sciences, ahvaz, iran. sara rekabeslamizadeh department of health information technology, faculty of allied health sciences, ahvaz jundishapur university of medical sciences, ahvaz, iran. maryam haddadzadeh faculty of medicine, ahvaz jundishapur university of medical sciences, ahvaz, iran. yalda sabaghan ahvaz imam educational hospital, ahvaz, iran.

background: acute appendicitis is one of the common and urgent illnesses among children.  children usually are unable to help the physicians completely due to weakness in describing the medical history. moreover, acute appendicitis overlaps with conditions of other diseases in terms of symptoms and signs in the first hours of presentation. these conditions lead to unwanted biases as well as err...

2005
Neil Kauer Wachovia Bank Yuliang Zheng

One-way hash algorithms are an indispensable tool in data security. Over the last decade or so a number of one-way hash algorithms have been designed and many of them have been used in numerous applications. Recent progress in cryptanalytic attacks on one-way hash algorithms by Wang and co-workers, however, has brought up the urgency of research into new and more secure algorithms. The goal of ...

Journal: :IACR Cryptology ePrint Archive 2005
Neil Kauer Tony Suarez Yuliang Zheng

One-way hash algorithms are an indispensable tool in data security. Over the last decade or so a number of one-way hash algorithms have been designed and many of them have been used in numerous applications. Recent progress in cryptanalytic attacks on one-way hash algorithms by Wang and co-workers, however, has brought up the urgency of research into new and more secure algorithms. The goal of ...

1997
Mineichi Kudo Jack Sklansky

Needs of feature selection in medium and large problems (medium-and large-scale feature selection) increases in many elds including medical and image processing elds. Previous comparative studies of feature selection algorithms are not suucient in problem size and in criterion function. In addition, no way has not shown to compare algorithms with diierent objectives. In this study, we propose a...

Journal: :Kybernetika 1998
Mineichi Kudo Jack Sklansky

Needs of feature selection in medium and large problems increases in many fields including medical and image processing fields. Previous comparative studies of feature selection algorithms are not satisfactory in problem size and in criterion function. In addition, no way has not shown to compare algorithms with different objectives. In this study, we propose a unified way to compare a large va...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید