نتایج جستجو برای: easy identification

تعداد نتایج: 512661  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

1997
David Naccache Jacques Stern

It is striking to observe that two decades after the discovery of public-key cryptography, the cryptographer’s toolbox contains only a dozen of asymmetric encryption schemes. This rarity and the fact that today’s most popular schemes had so far defied all complexity classification a.ttempts strongly motivates the design of new asymmetric cryptosystems. Interestingly, the crypt,ographic communit...

2016
John Smith Katerina Bezrukova Jonathan Baron Emily Corse Rachel Croson Sean Duffy Astri Muren

It is commonly assumed that identification with a social group is constant throughout the play of a one-shot game in the absence of feedback. We provide evidence which challenges this assumption. We direct subjects to play one of two versions of the prisoner's dilemma game. These versions are distinguished by the relative attractiveness of the uncooperative action. We refer to the version with ...

2012
Rong Chen Juan Dong Xin Cui Wei Wang Afshan Yasmeen Yun Deng Xiaomao Zeng Zhuo Tang

Chinese patent medicines (CPM) are highly processed and easy to use Traditional Chinese Medicine (TCM). The market for CPM in China alone is tens of billions US dollars annually and some of the CPM are also used as dietary supplements for health augmentation in the western countries. But concerns continue to be raised about the legality, safety and efficacy of many popular CPM. Here we report a...

Journal: :Perceptual and motor skills 2000
J M Brown C Koch

The contribution of the magnocellular (M) pathway to perceptual completion and depth processing was examined by comparing performance under black-and-white conditions with isoluminant color and diffuse red background conditions expected to suppress M pathway activity. Participants identified the repeated figure in pictures where only fragments of the figures were visible. The fragments were pre...

2000
Gyula Simon Johan Schoukens Yves Rolain

A completely automatic identification system is described which uses the latest results of the frequency domain identification approach to provide an easy-to-use and reliable tool to the inexperienced users. The proposed system accepts periodic measurement data and performs the whole identification procedure automatically from the data-preprocessing step to model and parameter selection. The va...

Journal: :Zootaxa 2014
Arne Redsted Rasmussen Kate Laura Sanders Michael L Guinea Andrew P Amey

Sea snakes (Elapidae, subfamilies Hydrophiinae and Laticaudinae) reach high species richness in the South China Sea and in the Australian region; however, most countries in the two regions still lack up-to-date checklists and identification tools for these snakes. We present an updated reviewed checklist and a new complete identification key to sea snakes in Australian waters. The identificatio...

1999
Olga Ilina Serguei Koval Michael Khitrov

Forensic speaker identification is one of the most important tasks dealt with in forensic phonetics. The usage of acoustic evidence increases and at the same time grows the necessity for easy-toapply and reliable methods. The method should be consistent and straight and should enable an expert to make identification decision with clearly determined probability. This paper is to outline the rout...

2008
Linchuan Li Yao Zhang Chengdong Ge Xiao Kan

With the advent of fast-growing digital, information, and network technologies and the desire for a more convenient lifestyle in recent years, users have higher security expectations for electronic systems. Additionally, e-Business, ATM, access control, and intelligent cards all require a safe and easy-to-use identification technology. The traditional identification method, user ID plus passwor...

2002
Myungsun Kim Kwangjo Kim

We introduce a new identification scheme based on the Gap Diffie-Hellman problem. Our identification scheme makes use of the fact that the computational Diffie-Hellman problem is hard in the additive group of points of an elliptic curve over a finite field, on the other hand, the decisional Diffie-Hellman problem is easy in the multiplicative group of the finite field mapped by a bilinear map. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید