نتایج جستجو برای: out scheme
تعداد نتایج: 1018417 فیلتر نتایج به سال:
In this paper performance evaluation of non contiguous spectrum allocation technique i. e. adaptive sub channel grouping scheme (ASG) is carried out. In ASG technique non contiguous frequency bands forms groups for MC-CDMA systems in downlink transmission. In this scheme channels are allocated to the users according to the CSI obtained and number of channels allocated to one user forms one grou...
Recently, based on Guillou-Quisquater signature scheme, Saeednia proposed an identity-based society oriented signature scheme. However, in this note, we point out that Saeednia’s scheme does not satisfy the claimed properties.
Key distribution schemes always played a pivotal role in the security of wireless sensor networks. In this research work we focus mainly on the security aspect of WSN . We have developed a modified key distribution scheme which uses the concepts of post as well as pre distribution scheme and thus hs proved to be a better alternative then the rest of two schemes. Simulation study has been carrie...
substituted 1, 2, 4- triazoles have shown multiple biological activities such as anti-inflammatory, anti fungal, etc. 5-mercapto triazoles were prepared from the potassium dithiocarbazinates. these triazoles were used for preparation of different derivatives by two different schemes. in the first scheme the mannich bases were prepared from 5- marcapto-s triazole quinazolines. the 5-marcato-s-tr...
In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...
The paper describes an annotation scheme for English based on Panini’s concept of karakas. We describe how the scheme handles certain constructions in English. By extending the karaka scheme for a fixed word order language, we hope to bring out its advantages as a concept that incorporates some ‘local semantics’. Our comparison with PTB-II and PropBank brings out its intermediary status between...
Background: Payment methods for healthcare services in a country impact the health status of its people and indices nation. Research findings have shown that care received obstetric outcomes women seeking natal their newborns are affected by insurance status. Objective:Comparative study between on scheme out -of- pocket payment. Materials Methods: The was prospective observational one involving...
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید