نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

2015
Ming Jin Nikolaos Bekiaris-Liberis Kevin Weekly Costas Spanos Alexandre Bayen

Sensing by proxy, as described in this study, is a sensing paradigm which infers latent factors by “proxy” measurements based on constitutive models that exploit the spatial and physical features in the system. In this study, we demonstrate the efficiency of sensing by proxy for occupancy detection based on indoor CO2 concentration. We propose a link model that relates the proxy measurements wi...

Journal: :International Journal of Informatics and Communication Technology (IJ-ICT) 2014

2017
John Tipton Mevin Hooten Simon Goring

Scientific records of temperature and precipitation have been kept for several hundred years, but for many areas, only a shorter record exists. To understand climate change, there is a need for rigorous statistical reconstructions of the paleoclimate using proxy data. Paleoclimate proxy data are often sparse, noisy, indirect measurements of the climate process of interest, making each proxy uni...

Arabia considers Iran the main source of instability in the region and believes that Iran seeks to dominate the Sunni Arabs through creating Shiite crescent. Especially after the Islamic Revolution, two countries have been as the rivals in the Persian Gulf. Ideological competition is considered as the core of competition in the areas of geopolitics, geostrategics and geoeconomics. In recent yea...

2012
Shahab D. Mohaghegh Shohreh Amini Vida Gholami

Developing proxy models has a long history in our industry. Proxy models provide fast approximated solutions that substitute large numerical simulation models. They serve specific useful purposes such as assisted history matching and production/injection optimization. Most common proxy models are either reduced models or response surfaces. While the former accomplishes the run-time speed by gro...

Journal: :I. J. Network Security 2015
Namita Tiwari Sahadeo Padhye

Multi-proxy signature (MPS) allows an original signer to authorize a group of proxy signers as his proxy agent to sign co-operatively a message. As per the literature, the relative computation cost of a pairing is approximately more than ten times of the scalar multiplication over elliptic curve group which indicates that pairing is a very expensive operation. Moreover the map-to-point function...

Journal: :JCP 2010
Zuowen Tan

In this paper, a proxy blind signature scheme based on bilinear pairing is proposed. The proposed proxy blind signature is existential unforgeable under adaptively chosen warrant attacks and chosen message attacks upon the CDH assumptions and DBDH assumptions in the Random Oracle Model. In order to make all levels of banks issue electronic coin, the proxy blind signature scheme is applied to co...

Journal: :I. J. Network Security 2009
Chunbo Ma Jun Ao

The notion of proxy cryptography is very useful in cases when one user needs to perform sensitive operation without holding the necessary secret key. Recently, proxy reencryption scheme received much attention due to its application in information storing, secure email, etc. In this paper, we propose a proxy re-encryption used to divert ciphertext from one group to another. The scheme is bidire...

2014
Kayvan Etebari Sassan Asgari

Mapping small reads to genome reference is an essential and more common approach to identify microRNAs (miRNAs) in an organism. Using closely related species genomes as proxy references can facilitate miRNA expression studies in non-model species that their genomes are not available. However, the level of error this introduces is mostly unknown, as this is the result of evolutionary distance be...

Journal: :J. Inf. Sci. Eng. 2012
Han-Yu Lin Tzong-Sun Wu Shih-Kun Huang

A strong designated verifier signature (SDVS) scheme only allows a designated verifier to validate signer’s signatures for ensuring confidentiality. At the same time, the designated verifier can not transfer the signature to any third party, since he can also generate another computationally indistinguishable SDVS, which is referred to as non-transferability. A proxy signature scheme is a speci...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید