Applying Graph Theory to Secure Data by Cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Graph Theory to Modeling Investigations

This paper presents a methodology for applying the elements of graph theory to modeling forensic investigations. This methodology uses well established principles of graph theory to model any forensic investigation and thus mathematically evaluate the elements of a case, including the probabilities associated with specific suspects

متن کامل

Applying Graph Theory to Interaction Design

Graph theory provides a substantial resource for a diverse range of quantitative and qualitative usability measures that can be used for evaluating recovery from error, informing design tradeoffs, probing topics for user training, and so on. Graph theory is a straight-forward, practical and flexible way to implement real interactive systems. Hence, graph theory complements other approaches to f...

متن کامل

JJE: Applying Graph Flow Theory to Wikipedia

Data in the world, and more specifically on the Internet is growing to massive sizes. In order to make this information more useful, it must first be more accessible. The INEX Initiative competition is aimed with the goal of identifying and comparing methodologies for categorizing information into clusters. The competition will be run on 60 gigabytes of data from Wikipedia, with the ultimate go...

متن کامل

applying transitivity theory to gender analysis of efl textbook: : a comparative study.

efl/esl textbooks have been regarded as essential language teaching materials with which the learners spend about 70 up to 90 percent of their class time. the important role they play and their vast use make them not only influential in learning the language but also in shaping values and attitudes. put it another way, textbooks socialize learners using their contents (i.e. texts, illustrations...

15 صفحه اول

Applying Classical Graph Theory to the Control of Multiagent Systems

48 IEEE CONTROL SYSTEMS MAGAZINE » DECEMBER 2008 1066-033X/08/$25.00©2008IEEE F or millions of years, nature has presented examples of collective behavior in groups of insects, birds, and fish. This behavior has arisen to permit sophisticated functions of the group that cannot be achieved by individual members [1], [2]. Collective behavior serves needs such as foraging for food, defense against...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Linguistics and Computational Applications

سال: 2021

ISSN: 2394-6385,2394-6393

DOI: 10.30726/ijlca/v8.i1.2020.81001