نتایج جستجو برای: out scheme

تعداد نتایج: 1018417  

2014
Hema R. Kale C. G. Dethe Milind M. Mushrif

In this paper performance evaluation of non contiguous spectrum allocation technique i. e. adaptive sub channel grouping scheme (ASG) is carried out. In ASG technique non contiguous frequency bands forms groups for MC-CDMA systems in downlink transmission. In this scheme channels are allocated to the users according to the CSI obtained and number of channels allocated to one user forms one grou...

Journal: :IACR Cryptology ePrint Archive 2003
Guilin Wang Bo Zhu

Recently, based on Guillou-Quisquater signature scheme, Saeednia proposed an identity-based society oriented signature scheme. However, in this note, we point out that Saeednia’s scheme does not satisfy the claimed properties.

2015
Shishir Sharma Gajendra Singh Chandel

Key distribution schemes always played a pivotal role in the security of wireless sensor networks. In this research work we focus mainly on the security aspect of WSN . We have developed a modified key distribution scheme which uses the concepts of post as well as pre distribution scheme and thus hs proved to be a better alternative then the rest of two schemes. Simulation study has been carrie...

Journal: :iranian journal of pharmaceutical sciences 0
subhas sahoo department of pharmaceutical chemistry, pulla reddy institute of pharmacy, hyderabad, india pranesh patwari k department of pharmaceutical chemistry, saraswathi college of ph. sciences, hyderabad, india mahendra kumar c.b department of pharmaceutical chemistry, st mary college of pharmacy, secunderabad, india c.maliikarjuna setty department of pharmaceutics, oxford college of pharmacy. banglaore, india.

substituted 1, 2, 4- triazoles have shown multiple biological activities such as anti-inflammatory, anti fungal, etc. 5-mercapto triazoles were prepared from the potassium dithiocarbazinates. these triazoles were used for preparation of different derivatives by two different schemes. in the first scheme the mannich bases were prepared from 5- marcapto-s triazole quinazolines. the 5-marcato-s-tr...

A. Cheraghi

In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...

2009
Ashwini Vaidya Samar Husain Prashanth Mannem Dipti Misra Sharma

The paper describes an annotation scheme for English based on Panini’s concept of karakas. We describe how the scheme handles certain constructions in English. By extending the karaka scheme for a fixed word order language, we hope to bring out its advantages as a concept that incorporates some ‘local semantics’. Our comparison with PTB-II and PropBank brings out its intermediary status between...

Journal: :International journal of advanced community medicine 2023

Background: Payment methods for healthcare services in a country impact the health status of its people and indices nation. Research findings have shown that care received obstetric outcomes women seeking natal their newborns are affected by insurance status. Objective:Comparative study between on scheme out -of- pocket payment. Materials Methods: The was prospective observational one involving...

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید