نتایج جستجو برای: dental leakages
تعداد نتایج: 162691 فیلتر نتایج به سال:
Dağıtım sistemlerinde sızıntıların önemli bir kısmını yüzeye çıkmayan arızalar oluşturmaktadır. Bu çalışmada arızaların yönetilmesi ve azaltılmasında aktif kaçak kontrolü metodolojisi önerilmiş sahada uygulanarak sonuçlar tartışılmıştır. kapsamda Malatya ili merkez dağıtım sisteminde pilot uygulama gerçekleştirilmiştir. Bir idarede bu metodolojinin uygulanması sistemin işletmeye alınması için ç...
Agricultural support programs distribute payments to farms based on a diverse set of policy objectives. Adequate targeting this priority areas is key efficient and effective policy. We evaluated the strategy national-level program in Mexico that distributed seven criteria prioritized poor smallholder farming communities at high risk cropland failure. used series logistic models assess coverage ...
introduction: the aim of this descriptive cross-sectional study was to assess the general dental practitioners (gdps)’s knowledge regarding the emergency management of traumatic dental injuries (tdi) in isfahan, iran. methods and materials: in this study a two-part questionnaire consisting of 14 questions was distributed among 241 gdps. part 1 included seven questions focusing on personal and p...
In the last century, modern cryptology has mainly focused on defining cryptosystems resistant against logical attacks. But lately, with the increasing use of secure embedded systems, researchers focused on the correlation between data processed by cryptographic devices and their physical leakages. As a result, new, efficient side-channel attacks exploiting these physical leakages have appeared ...
As the search for alternative financing for development continues, attention has recently been paid to remittances as a potential substitute (or at least significant complement) to conventional official and private flows. However, its ability to fit into this role depends a lot not only its size (which is acknowledged to have grown significantly in recent years), but also to what use it is put....
The Treasury Single Account (TSA) policy was introduced to block financial leakages, promote transparency and prevent mismanagement of government's revenue, unifies all government accounts, enabling it prevent revenue loss and mismanagement by revenue-generating agencies. This research examines the effect of treasury single account policy on the public financial management in Nigeria. The objec...
The standard mechanism design approach to collusion in auctions posits an uninformed, disinterested third party who designs and implements the mechanism. However, in many environments, collusion agreements are likely to be both proposed and executed by the involved parties. When this is the case, the standard approach may be inadequate; it neglects potential information leakages and minimizes f...
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysis and Gaussian templates are essentially equivalent. In this paper, we show that in the context of multivariate attacks against masked implementations, this conclusion does not hold anymore. While a single distinguish...
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is assumed that one has full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, whether or not Template Attack exploits side-channel leakages to the fullest is still not clear. In this paper, we present a negative answer to this cent...
One of the numerous ways of addressing the Android malware threat is to run malicious applications in a sandbox environment while monitoring metrics. However, dynamic malware analysis is usually concerned with a one-time execution of an application, and information about behaviour in different environments is lacking in the literature. We fill this gap with a fuzzy-like approach to the problem:...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید