نتایج جستجو برای: modiriat abe shahri

تعداد نتایج: 1929  

2011
Laura Laaksonen Ville Myllylä Riitta Niemistö

This paper describes an artificial bandwidth extension (ABE) method that generates new high frequency components to a narrowband signal by folding specifically gained subbands to frequencies from 4 kHz to 7 kHz, and improves the quality and intelligibility of narrowband speech in mobile devices. The proposed algorithm was evaluated by subjective listening tests. In addition, rarely used convers...

2013
Sharon L. Reynolds Jerry D. Johnson James A. Salzman

The extant literature offers little to describe the processes for screening students in adult basic education (ABE) programs for potential learning disabilities, referring adult students for diagnostic assessment, or barriers to obtaining diagnostic assessment for a learning disability. Without current documentation of a learning disability, ABE students are excluded from obtaining accommodatio...

Journal: :Journal of Systems and Software 2017
Rui Zhang Hui Ma Yao Lu

Attribute-based encryption (ABE) has potential to be applied in cloud computing applications to provide fine-grained access control over encrypted data. However, the computation cost of ABE is considerably expensive, because the pairing and exponentiation operations grow with the complexity of access formula. In this work, we propose a fully outsourced ciphertextpolicy ABE scheme that for the f...

2003
Xiaofeng Chen Byoungcheon Lee Kwangjo Kim

Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and Suzuki’s scheme only provides receipt-freeness for losing bidders. We argue that it is more important to provide receipt-freeness for winners and propose a new receipt-free sealed bid auction scheme using the homomorp...

2012
Nelly Fazio Irippuge Milinda Perera

Motivation & State-of-the-Art Cryptographic tools for securing multicast communications: Broadcast Encryption (BE): transmit data to a dynamically changing set of recipients o Info about receivers is broadcast in the clear Receivers’ identities often sensitive. Secure communication ought to protect more than just transmitted content! Anonymous BE (ABE) [BBW06]: also hides receiver set Current b...

2014
Shraddha U. Rasal Bharat Tidke

Traditional system in cryptography allows just sharing of keys between the sender and receiver, for such a technique only the signature storage is provided for the user’s public key. But as the number of users increases, it’s became a challenging job to have such a certificate storage as well as key distribution, to overcome this Identity Based Encryption (IBE) was proposed, but again it had cr...

2007
Rafail Ostrovsky Amit Sahai Brent Waters

We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited to expressing only monotonic access structures. We provide a proof of security for our scheme based on the Decisional Bilinear Diffie-Hellman (BDH) assumption. Furthermore, the performance of our new scheme com...

Journal: :Journal of Epidemiology & Community Health 1993

2016
Chuang Xue Zixuan Wang Shudong Wang Xiaotong Zhang Lijie Chen Ying Mu Fengwu Bai

BACKGROUND Butanol is not only an important solvent and chemical intermediate in food and pharmaceutical industries, but also considered as an advanced biofuel. Recently, there have been resurging interests in producing biobutanol especially using low-cost lignocellulosic biomass, but the process still suffers from low titer and productivity. The challenge for the bioconversion approach is to f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید