نتایج جستجو برای: proxy model
تعداد نتایج: 2124051 فیلتر نتایج به سال:
Sensing by proxy, as described in this study, is a sensing paradigm which infers latent factors by “proxy” measurements based on constitutive models that exploit the spatial and physical features in the system. In this study, we demonstrate the efficiency of sensing by proxy for occupancy detection based on indoor CO2 concentration. We propose a link model that relates the proxy measurements wi...
Scientific records of temperature and precipitation have been kept for several hundred years, but for many areas, only a shorter record exists. To understand climate change, there is a need for rigorous statistical reconstructions of the paleoclimate using proxy data. Paleoclimate proxy data are often sparse, noisy, indirect measurements of the climate process of interest, making each proxy uni...
Arabia considers Iran the main source of instability in the region and believes that Iran seeks to dominate the Sunni Arabs through creating Shiite crescent. Especially after the Islamic Revolution, two countries have been as the rivals in the Persian Gulf. Ideological competition is considered as the core of competition in the areas of geopolitics, geostrategics and geoeconomics. In recent yea...
Developing proxy models has a long history in our industry. Proxy models provide fast approximated solutions that substitute large numerical simulation models. They serve specific useful purposes such as assisted history matching and production/injection optimization. Most common proxy models are either reduced models or response surfaces. While the former accomplishes the run-time speed by gro...
Multi-proxy signature (MPS) allows an original signer to authorize a group of proxy signers as his proxy agent to sign co-operatively a message. As per the literature, the relative computation cost of a pairing is approximately more than ten times of the scalar multiplication over elliptic curve group which indicates that pairing is a very expensive operation. Moreover the map-to-point function...
In this paper, a proxy blind signature scheme based on bilinear pairing is proposed. The proposed proxy blind signature is existential unforgeable under adaptively chosen warrant attacks and chosen message attacks upon the CDH assumptions and DBDH assumptions in the Random Oracle Model. In order to make all levels of banks issue electronic coin, the proxy blind signature scheme is applied to co...
The notion of proxy cryptography is very useful in cases when one user needs to perform sensitive operation without holding the necessary secret key. Recently, proxy reencryption scheme received much attention due to its application in information storing, secure email, etc. In this paper, we propose a proxy re-encryption used to divert ciphertext from one group to another. The scheme is bidire...
Mapping small reads to genome reference is an essential and more common approach to identify microRNAs (miRNAs) in an organism. Using closely related species genomes as proxy references can facilitate miRNA expression studies in non-model species that their genomes are not available. However, the level of error this introduces is mostly unknown, as this is the result of evolutionary distance be...
A strong designated verifier signature (SDVS) scheme only allows a designated verifier to validate signer’s signatures for ensuring confidentiality. At the same time, the designated verifier can not transfer the signature to any third party, since he can also generate another computationally indistinguishable SDVS, which is referred to as non-transferability. A proxy signature scheme is a speci...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید