Suasana Mendung di Cempaka Sari

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New attacks on SARI image authentication system

The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been reported recently. In this paper, we propose two new attacks that can compromise the SARI system. The first attack is called a histogram attack which modifies DCT coefficients yet maintains the same relationship between an...

متن کامل

Survey of Suicide Attempts in Sari

OBJECTIVE Studying suicide can be of assistance to prepare the ground for the adoption of effective preventative measures. In the present study, our aim was an in-depth review of suicide epidemiology in the city of Sari, in the northern part of Iran. Our focus was on geo-demographic and other risk factors affecting the frequency of suicide in order to demonstrate populations with greater risk o...

متن کامل

Il Birraio di Preston di Andrea Camilleri

Nella letteratura italiana degli ultimi decenni lo scrittore Andrea Camilleri rappresenta un caso raro di successo editoriale e di pubblico, con centinaia di migliaia di copie vendute, traduzioni in molte lingue, riconoscimenti e convegni in suo onore. Uno dei suoi titoli più noti è il romanzo storico Il Birraio di Preston. Lo scrittore è diventato famoso presso il grande pubblico inizialmente ...

متن کامل

DI SALERNO Dipartimento di Informatica

Despite modern technology provide new tools to measure the world around us, we are quickly generating massive amounts of high-dimensional, spatialtemporal data. In this work, I deal with two types of datasets: one in which the spatial characteristics are relatively dynamic and the data are sampled at different periods of time, and the other where many dimensions prevail, although the spatial ch...

متن کامل

On the security of the SARI image authentication system

In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In particular, we look at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wacana Seni Journal of Arts Discourse

سال: 2020

ISSN: 1675-3410,2180-4311

DOI: 10.21315/ws2020.19.6