نتایج جستجو برای: Hybrid Schemes

تعداد نتایج: 289827  

A hybrid censoring scheme is a mixture of type I and type II censoring schemes. When $n$ items are placed on a life test, the experiment terminates under type I or type II hybrid censoring scheme if either a pre-fixed censoring time T or the rth (1<=r<=n&nbsp;is fixed) failure is first or later observed, respectively. In this paper, we investigate the decomposition of entropy in both hybrid cen...

A. Habibi Rad, M. Izanlo,

The unified hybrid censoring is a mixture of generalized Type-I and Type-II hybrid censoring schemes. This article presents the statistical inferences on Generalized Exponential Distribution parameters when the data are obtained from the unified hybrid censoring scheme. It is observed that the maximum likelihood estimators can not be derived in closed form. The EM algorithm for computing the ma...

Journal: :Science China Physics, Mechanics and Astronomy 2014

A. Habibi Rad1, F. Yousefzadeh,

The mixture of Type I and Type II censoring schemes, called the hybrid censoring. This article presents the statistical inferences on lognormal parameters when the data are hybrid censored. We obtain the maximum likelihood estimators (MLEs) and the approximate maximum likelihood estimators (AMLEs) of the unknown parameters. Asymptotic distributions of the maximum likelihood estimators are used ...

Journal: :IACR Cryptology ePrint Archive 2004
Alexander W. Dent

This paper considers the idea that other schemes besides asymmetric encryption schemes can benefit from a formalisation of the principles of hybrid cryptography. The main focus of research in hybrid cryptography has been in producing efficient asymmetric encryption schemes. Not only have several schemes been proposed, but also a generic method of constructing hybrid encryption schemes from lowe...

Journal: :IACR Cryptology ePrint Archive 2001
Louis Granboulan

This document compares the two published RSA-based hybrid encryption schemes having linear reduction in their security proof: RSA-KEM with DEM1 and RSA-REACT. While the performance of RSA-REACT is worse than the performance of RSA-KEM+DEM1, a complete proof of its security has already been published. This is indeed an advantage, because we show that the security result for RSAKEM+DEM1 has a sma...

2008
Kvetoslava Kotuliaková Ivan Kotuliak

Presented paper describes and analyses HARQ (Hybrid Automatic Repeat Request) and pure ARQ schemes. We focus on selected HARQ techniques applied to IP protocol and also to LMS channel. The efficiency of HARQ scheme is compared with GBN schemes using different lengths of IP packets. We show that usage of smaller packets and hybrid schemes leads to an improved throughput. Differences between pure...

Journal: :IACR Cryptology ePrint Archive 2007
Xianhui Lu Xuejia Lai Dake He Guomin Li

We propose a security notion named as weak adaptive chosen ciphertext security(INDWCCA) for hybrid encryption schemes. Although it is weaker than adaptive chosen ciphertext security(INDCCA), a IND-WCCA secure hybrid encryption scheme can be used in any situations that a IND-CCA secure hybrid encryption scheme used in. We show that IND-WCCA secure hybrid encryption scheme can be constructed from...

Journal: :Computational Statistics & Data Analysis 2013
N. Balakrishnan Debasis Kundu

A hybrid censoring scheme is a mixture of Type-I and Type-II censoring schemes. In this review, we first discuss Type-I and Type-II hybrid censoring schemes and associated inferential issues. Next, we present details on developments regarding generalized hybrid censoring and unified hybrid censoring schemes that have been introduced in the literature. Hybrid censoring schemes have been adopted ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید