نتایج جستجو برای: plain

تعداد نتایج: 45208  

2016
John F Grider Angela L Larsen Jessica A Homyack Matina C Kalcounis-Rueppell

Across the entire distribution of a species, populations may have variable responses to environmental perturbations. Many bat species experience mortality in large portions of their range during hibernation and along migratory paths to and from wintering grounds, from White-nose syndrome (WNS) and wind energy development, respectively. In some areas, warm temperatures may allow bats to remain a...

Journal: :Tobacco control 2016
Sally Dunlop Donna Perez Anita Dessaix David Currow

BACKGROUND In December 2012, Australia introduced world-first legislation mandating plain packaging for all tobacco products. To date, there is very little evidence on youth responses to the changed packs. AIM To assess attitudes towards, and responses to, tobacco plain packs preimplementation and postimplementation. METHODS The Tobacco Promotion Impact Study (TPIS) was a yearly cross-secti...

Journal: :CoRR 2012
Chengqing Li Yuansheng Liu Tao Xie

Recently, a novel image encryption scheme based on improved hyperchaotic sequences was proposed. A pseudorandom number sequence, generated by a hyper-chaos system, is used to determine two involved encryption functions, bitwise exclusive or (XOR) operation and modulo addition. It was reported that the scheme can be broken with some pairs of chosen plain-images and the corresponding cipher-image...

2012
Avinash Sharma Anurag Bhatnagar Nikhar Tak Anuradha Sharma Jitendra Avasthi Prerna sharma

In polyalphabetic substitution the plain text’s letters are enciphered differently according to their position. The name polyalphabetic suggests that there are more than one key so we have used two keys combination instead of just one, in order to produce the cipher text. We can also use three or more keys to make the enciphering process more complicated. In this paper have produced ASCII Codes...

2011
Wan-Liang Guo Jian Wang Min Zhou Mao Sheng Lin Fang

INTRODUCTION INTRODUCTION The diagnostic value of colour Doppler sonography for the detection of blood flow in intussusception is questionable. The purpose of this study was to evaluate plain radiography in the assessment of vascular compromise in children with intussusception. MATERIAL AND METHODS The hospital notes of 1,119 paediatric cases of intussusception who presented between Januar...

Journal: :BMJ open 2016
Nicole Hughes Monika Arora Nathan Grills

OBJECTIVE To review the current literature around the potential impact, effectiveness and perceptions of plain packaging in low income settings. METHOD A systematic review of the literature. DATA SOURCES 9 databases (PubMed, Global Health, Social Policy and Practice, Applied Social Sciences Index and Abstracts (ASSIA), CINAHL, PsycINFO, British Library for Development Studies (BLDS), Global...

2015
Holger Mitterer Taehong Cho Sahyang Kim

Recent studies on perceptual learning have indicated that listeners use intermediate units between the acoustic input and lexical representations of words. The same paradigm may also reveal the nature of these intermediate units based on patterns of generalization of learning. We here test whether learning generalizes to other units of the same underlying or surface representation. This was ach...

Journal: :CoRR 2013
Musheer Ahmad Hamed D. Al-Sharari

In this paper, a simple and robust color image encryption algorithm based on highdimensional chaotic maps is proposed. The algorithm employs a 3D Arnold transform to perform inter-component shuffling of plain-image, while a 2D hyper-chaotic map is used to confuse the relationship between the encrypted image and plain-image. The control parameters of Arnold transform are extracted from pending p...

Journal: :CoRR 2015
Sinjan Chakraborty Vineet Kumar

This project involves an implementation of the Rivest Shamir Adleman (RSA)[1] encryption algorithm in C. It consists of generation of two random prime numbers and a number coprime to φ(n) also called euler toitent function. These three are used to generate a public key and private key. The user has to enter a message which is encrypted by the public key. The algorithm also decrypts the generate...

Journal: :IACR Cryptology ePrint Archive 2007
Chengqing Li Shujun Li Muhammad Asim Juana Nunez Gonzalo Alvarez Guanrong Chen

This paper studies the security of a recently-proposed image encryption scheme based on chaos, and points out the following problems: 1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for the encryption/decryption processes; 2) given one chosen plain-image, a sub-key K10 can be guessed with a smaller computational complexity than that of the simple br...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید