نتایج جستجو برای: Hybrid Schemes
تعداد نتایج: 289827 فیلتر نتایج به سال:
A hybrid censoring scheme is a mixture of type I and type II censoring schemes. When $n$ items are placed on a life test, the experiment terminates under type I or type II hybrid censoring scheme if either a pre-fixed censoring time T or the rth (1<=r<=n is fixed) failure is first or later observed, respectively. In this paper, we investigate the decomposition of entropy in both hybrid cen...
The unified hybrid censoring is a mixture of generalized Type-I and Type-II hybrid censoring schemes. This article presents the statistical inferences on Generalized Exponential Distribution parameters when the data are obtained from the unified hybrid censoring scheme. It is observed that the maximum likelihood estimators can not be derived in closed form. The EM algorithm for computing the ma...
The mixture of Type I and Type II censoring schemes, called the hybrid censoring. This article presents the statistical inferences on lognormal parameters when the data are hybrid censored. We obtain the maximum likelihood estimators (MLEs) and the approximate maximum likelihood estimators (AMLEs) of the unknown parameters. Asymptotic distributions of the maximum likelihood estimators are used ...
This paper considers the idea that other schemes besides asymmetric encryption schemes can benefit from a formalisation of the principles of hybrid cryptography. The main focus of research in hybrid cryptography has been in producing efficient asymmetric encryption schemes. Not only have several schemes been proposed, but also a generic method of constructing hybrid encryption schemes from lowe...
This document compares the two published RSA-based hybrid encryption schemes having linear reduction in their security proof: RSA-KEM with DEM1 and RSA-REACT. While the performance of RSA-REACT is worse than the performance of RSA-KEM+DEM1, a complete proof of its security has already been published. This is indeed an advantage, because we show that the security result for RSAKEM+DEM1 has a sma...
Presented paper describes and analyses HARQ (Hybrid Automatic Repeat Request) and pure ARQ schemes. We focus on selected HARQ techniques applied to IP protocol and also to LMS channel. The efficiency of HARQ scheme is compared with GBN schemes using different lengths of IP packets. We show that usage of smaller packets and hybrid schemes leads to an improved throughput. Differences between pure...
We propose a security notion named as weak adaptive chosen ciphertext security(INDWCCA) for hybrid encryption schemes. Although it is weaker than adaptive chosen ciphertext security(INDCCA), a IND-WCCA secure hybrid encryption scheme can be used in any situations that a IND-CCA secure hybrid encryption scheme used in. We show that IND-WCCA secure hybrid encryption scheme can be constructed from...
A hybrid censoring scheme is a mixture of Type-I and Type-II censoring schemes. In this review, we first discuss Type-I and Type-II hybrid censoring schemes and associated inferential issues. Next, we present details on developments regarding generalized hybrid censoring and unified hybrid censoring schemes that have been introduced in the literature. Hybrid censoring schemes have been adopted ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید