نتایج جستجو برای: dental leakages

تعداد نتایج: 162691  

Journal: : 2022

Dağıtım sistemlerinde sızıntıların önemli bir kısmını yüzeye çıkmayan arızalar oluşturmaktadır. Bu çalışmada arızaların yönetilmesi ve azaltılmasında aktif kaçak kontrolü metodolojisi önerilmiş sahada uygulanarak sonuçlar tartışılmıştır. kapsamda Malatya ili merkez dağıtım sisteminde pilot uygulama gerçekleştirilmiştir. Bir idarede bu metodolojinin uygulanması sistemin işletmeye alınması için ç...

Journal: :Land 2021

Agricultural support programs distribute payments to farms based on a diverse set of policy objectives. Adequate targeting this priority areas is key efficient and effective policy. We evaluated the strategy national-level program in Mexico that distributed seven criteria prioritized poor smallholder farming communities at high risk cropland failure. used series logistic models assess coverage ...

Journal: :iranian endodontic journal 0
najme akhlaghi nosrat nourbakhsh abbasali khademi leila karimi

introduction: the aim of this descriptive cross-sectional study was to assess the general dental practitioners (gdps)’s knowledge regarding the emergency management of traumatic dental injuries (tdi) in isfahan, iran. methods and materials: in this study a two-part questionnaire consisting of 14 questions was distributed among 241 gdps. part 1 included seven questions focusing on personal and p...

2009
V. Lomné A. Dehbaoui T. Ordas P. Maurine L. Torres M. Robert R. Soares N. Calazans F. Moraes

In the last century, modern cryptology has mainly focused on defining cryptosystems resistant against logical attacks. But lately, with the increasing use of secure embedded systems, researchers focused on the correlation between data processed by cryptographic devices and their physical leakages. As a result, new, efficient side-channel attacks exploiting these physical leakages have appeared ...

2010
Chukwuma Agu

As the search for alternative financing for development continues, attention has recently been paid to remittances as a potential substitute (or at least significant complement) to conventional official and private flows. However, its ability to fit into this role depends a lot not only its size (which is acknowledged to have grown significantly in recent years), but also to what use it is put....

2016
Yusuf Maiwada Bashir

The Treasury Single Account (TSA) policy was introduced to block financial leakages, promote transparency and prevent mismanagement of government's revenue, unifies all government accounts, enabling it prevent revenue loss and mismanagement by revenue-generating agencies. This research examines the effect of treasury single account policy on the public financial management in Nigeria. The objec...

Journal: :J. Economic Theory 2017
Peter Troyan

The standard mechanism design approach to collusion in auctions posits an uninformed, disinterested third party who designs and implements the mechanism. However, in many environments, collusion agreements are likely to be both proposed and executed by the involved parties. When this is the case, the standard approach may be inadequate; it neglects potential information leakages and minimizes f...

Journal: :IACR Cryptology ePrint Archive 2010
François-Xavier Standaert Nicolas Veyrat-Charvillon Elisabeth Oswald Benedikt Gierlichs Marcel Medwed Markus Kasper Stefan Mangard

In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysis and Gaussian templates are essentially equivalent. In this paper, we show that in the context of multivariate attacks against masked implementations, this conclusion does not hold anymore. While a single distinguish...

2013
Guangjun Fan Yongbin Zhou Hailong Zhang Dengguo Feng

Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is assumed that one has full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, whether or not Template Attack exploits side-channel leakages to the fullest is still not clear. In this paper, we present a negative answer to this cent...

2016
Catherine Boileau François Gagnon Jérémie Poisson Simon Frenette Mohamed Mejri

One of the numerous ways of addressing the Android malware threat is to run malicious applications in a sandbox environment while monitoring metrics. However, dynamic malware analysis is usually concerned with a one-time execution of an application, and information about behaviour in different environments is lacking in the literature. We fill this gap with a fuzzy-like approach to the problem:...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید