نتایج جستجو برای: dental leakages
تعداد نتایج: 162691 فیلتر نتایج به سال:
In this paper we analyze security of robust data-hiding in channels with geometrical transformations. We categorize possible decoding strategies for channels with geometrical transformations within the information-theoretic framework for geometrically-robust datahiding. Furthermore, considering template-based and redundantbased design of geometrically robust data-hiding systems, we provide the ...
BACKGROUND AND STUDY AIMS Endoscopic vacuum treatment (EVT) is increasingly used in the treatment of anastomotic leakages and perforations in the upper gastrointestinal tract. However, sponges often have to be mounted individually on a gastric tube and endoscopic introduction of the latter into an infected extraluminal cavity is challenging. In order to facilitate this procedure in some anatomi...
In spite of the advantages of zeotropic refrigerant mixtur~" [1], the industrial >tpplications of mixtures have been very limited up to now. The major problem is seen iu the leakages occuring in refrigeration plants and so a possible change in composition. Another disadvantage is that no simple methods for determination of the concentratiou insick the t:ydc i\rc available. This paper pre$ents t...
Cryptographic implementations are vulnerable to side-channel analysis. Implementors often opt for masking countermeasures to protect against these types of attacks. Masking countermeasures can ensure theoretical protection against value-based leakages. However, the practical effectiveness of masking is often halted by physical effects such as glitches and distance-based leakages, which violate ...
Maintenance tasks are crucial for all kind of industries, especially in extensive industrial plants, like solar thermal power plants. The incorporation of robots is a key issue for automating inspection activities, as it will allow a constant and regular control over the whole plant. This paper presents an autonomous robotic system to perform pipeline inspection for early detection and preventi...
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its physical information leakages as an overdefined system of equations that the adversary tries to solve. They were first applied to PRESENT because of its simple algebraic structure. In this paper, we investigate the exte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید