منابع مشابه
Scrambling and Processing: Dependencies, Complexity, and Constraints
Two approaches characterize the current state of research in sentence processing. Both approaches aim to arrive at a well-grounded analysis of relevant constraints the construction is subject to. The first approach relies heavily on the hypothesis that a psycholinguistic investigation of a phenomenon can shed the light on some unresolved linguistic problem. The second approach advocated by cogn...
متن کاملParallel imaging with phase scrambling.
PURPOSE Most existing methods for accelerated parallel imaging in MRI require additional data, which are used to derive information about the sensitivity profile of each radiofrequency (RF) channel. In this work, a method is presented to avoid the acquisition of separate coil calibration data for accelerated Cartesian trajectories. METHODS Quadratic phase is imparted to the image to spread th...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملthe effect of task complexity on efl learners’ written task performance in terms of accuracy and complexity
هدف اصلی این تحقیق بررسی تاثیر افزایش میزان پیچیدگی تکالیف مکالمه محور بر دقت و صحت و پیچیدگی عملکرد نوشتاری زبان آموزان می باشد. بدین منظور، 50 نفر از دانش آموزان دختر در رده ی سنی 15 الی 18 سال درسطح pre-intermediate از طریق petو vhs تست به عنوان شرکت کنندگان در تحقیق انتخاب شدند و به دو گروه آزمایشی و کنترل بصورت اتفاقی تقسیم شدند. اعضای گروه آزمایشی دو تکلیف ساده و پیچیده را طی 2 جلسه انجام...
Time and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2019
ISSN: 2469-9926,2469-9934
DOI: 10.1103/physreva.99.062334