نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

2014
Chung-Fu Lu Chien-Lung Hsu Chien-Hui Su

A convertible multi-authenticated encryption (CMAE) scheme allows a group of signers to cooperatively produce a valid authenticated encryption signature and still preserves the characteristic of convertible authenticated encryption (CAE) schemes. In 2008, Tsai proposed a CMAE scheme based on the intractability of one-way hash functions and discrete logarithms. However, we find that Tsai’s schem...

1997
V. R. Gavrilov

We consider a D-dimensional cosmological model describing an evolution of Ricci-flat factor spaces, M1, . . . , Mn (n ≥ 3), in the presence of an m-component perfect fluid source (n− 1 ≥ m ≥ 2). We find characteristic vectors, related to the matter constants in the barotropic equations of state for fluid components of all factor spaces. We show that, in the case where we can interpret these vec...

This paper proposes an MPC - based (model predictive control) scheme to control active and reactive powers of DERs (distributed energy resources) in a grid - connected mode (either through a bus with its associated loads as a PCC (point of common coupling) or an MG (micro - grid)). DER may be a DG (distributed generation) or an ESS (energy storage system). In the proposed scheme, the set - poin...

Journal: :CoRR 2015
Bjoern Andres

For every simple, undirected graph G = (V,E), a one-to-one relation exists between the decompositions and the multicuts of G. A decomposition of G is a partition Π of V such that, for every U ∈ Π, the subgraph of G induced by U is connected. A multicut of G is a subset M ⊆ E of edges such that, for every (chordless) cycle C ⊆ E of G, |M ∩ C| 6 = 1. The multicut induced by a decomposition is the...

2015
Luca Scala

We study general symmetric powers SL of a tautological bundle L on the Hilbert scheme X [n] of n points over a smooth quasi-projective surface X, associated to a line bundle L on X. Let VL be the Sn-vector bundle on X n defined as the exterior direct sum L · · · L. We prove that the Bridgeland-King-Reid transform Φ(SL) of symmetric powers SL is quasi isomorphic to the last term of a finite decr...

1994
PAOLO ALUFFI

In this note we compare two notions of Chern class of an algebraic scheme X (over C) specializing to the Chern class of the tangent bundle c(TX) ∩ [X] when X is nonsingular. The first of such notions is MacPherson’s Chern class, defined by means of Mather-Chern classes and local Euler obstructions [5]. MacPherson’s Chern class is functorial with respect to a push-forward defined via topological...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1391

nowadays enhancing critical thinking in learners is considered one of the foreign language teachers’ tasks due to its high position in foreign language classrooms. when it comes to selecting materials for language classrooms, there are obviously some criteria that teachers should apply. the present study aimed at a critical thinking based analysis of ten picture story books and ten folktales th...

2003
Giuseppe Ateniese Breno de Medeiros

Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...

2016
Seungmin Jung

A FPGA implementation of fingerprint sensors scheme is described for removing parasitic offset image on no touch. This paper proposes an effective fingerprint identification system with 160x192 array fingerprint sensor hardware. The proposed calibration scheme initializes a fingerprint sensor LSI to eliminate the influence of offset image by the electrical characteristic difference of pixel arr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید