نتایج جستجو برای: characteristic based scheme
تعداد نتایج: 3187217 فیلتر نتایج به سال:
A convertible multi-authenticated encryption (CMAE) scheme allows a group of signers to cooperatively produce a valid authenticated encryption signature and still preserves the characteristic of convertible authenticated encryption (CAE) schemes. In 2008, Tsai proposed a CMAE scheme based on the intractability of one-way hash functions and discrete logarithms. However, we find that Tsai’s schem...
We consider a D-dimensional cosmological model describing an evolution of Ricci-flat factor spaces, M1, . . . , Mn (n ≥ 3), in the presence of an m-component perfect fluid source (n− 1 ≥ m ≥ 2). We find characteristic vectors, related to the matter constants in the barotropic equations of state for fluid components of all factor spaces. We show that, in the case where we can interpret these vec...
This paper proposes an MPC - based (model predictive control) scheme to control active and reactive powers of DERs (distributed energy resources) in a grid - connected mode (either through a bus with its associated loads as a PCC (point of common coupling) or an MG (micro - grid)). DER may be a DG (distributed generation) or an ESS (energy storage system). In the proposed scheme, the set - poin...
For every simple, undirected graph G = (V,E), a one-to-one relation exists between the decompositions and the multicuts of G. A decomposition of G is a partition Π of V such that, for every U ∈ Π, the subgraph of G induced by U is connected. A multicut of G is a subset M ⊆ E of edges such that, for every (chordless) cycle C ⊆ E of G, |M ∩ C| 6 = 1. The multicut induced by a decomposition is the...
We study general symmetric powers SL of a tautological bundle L on the Hilbert scheme X [n] of n points over a smooth quasi-projective surface X, associated to a line bundle L on X. Let VL be the Sn-vector bundle on X n defined as the exterior direct sum L · · · L. We prove that the Bridgeland-King-Reid transform Φ(SL) of symmetric powers SL is quasi isomorphic to the last term of a finite decr...
In this note we compare two notions of Chern class of an algebraic scheme X (over C) specializing to the Chern class of the tangent bundle c(TX) ∩ [X] when X is nonsingular. The first of such notions is MacPherson’s Chern class, defined by means of Mather-Chern classes and local Euler obstructions [5]. MacPherson’s Chern class is functorial with respect to a push-forward defined via topological...
nowadays enhancing critical thinking in learners is considered one of the foreign language teachers’ tasks due to its high position in foreign language classrooms. when it comes to selecting materials for language classrooms, there are obviously some criteria that teachers should apply. the present study aimed at a critical thinking based analysis of ten picture story books and ten folktales th...
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...
A FPGA implementation of fingerprint sensors scheme is described for removing parasitic offset image on no touch. This paper proposes an effective fingerprint identification system with 160x192 array fingerprint sensor hardware. The proposed calibration scheme initializes a fingerprint sensor LSI to eliminate the influence of offset image by the electrical characteristic difference of pixel arr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید