Computation of the Genetic Code: Full Version

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

phylogeography and genetic diversity of the lesser mouse- eared bat (myotis blythii) in iran

in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...

Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation (Full Version)

We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n-party randomized function and show that if f can be computed by a circuit of size c, then O(cnκ) is an upper bound for active security with optimal resilience t < n/2 and security parameter κ. This improves on the communicatio...

متن کامل

Cryptanalysis of KLEIN (Full version)

Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the atten...

متن کامل

strategies applied in translation of culture-specific items in translation of the i. r. i. constitution &the civil code (from persian into english(

این تحقیق به بررسی استراتژیهای بکاررفته توسط مترجمین مختلف در ترجمه واژه های فرهنگی خاص در ترجمه فارسی به انگلیسی قانون مدنی و قانون اساسی جمهوری اسلامی ایران میپردازد.این تحقیق بر اساس نظریه پیتر نیومارک صرت گرفته است. در این تحفیق واژه های فرهنگی خاص اقتباس شده و پس از مقایسه با متن مبدا به بررسی انها پرداخته می شود.در قسمت ضمائم تحقیق واژه نامه ای برای اشنایی خوانندگان با لغات و اصطلاحات حقو...

A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)

There are protocols to privately evaluate any function in the passive (honest-but-curious) setting assuming that the honest nodes are in majority. For some specific functions, protocols are known which remain secure even without an honest majority. The seminal work by Chor and Kushilevitz [7] gave a complete characterization of Boolean functions, showing that each Boolean function either requir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer and Communications

سال: 2017

ISSN: 2327-5219,2327-5227

DOI: 10.4236/jcc.2017.510008