نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

Journal: :the modares journal of electrical engineering 2010
syed saeed - mohtavipour mohsen - parsa moghadam mahmood reza - haghifam

a critical protection requirement for grid connected distributed generators (dg) is anti-islanding protection. in this paper, a new islanding detection method for any possible network loading is proposed based on utilizing and combining various system parameter indices. in order to secure the detection of islanding, eight intentional disturbances are imposed to the system under study in which t...

Journal: :IACR Cryptology ePrint Archive 2012
Mihir Bellare Kenneth G. Paterson Susan Thomson

We provide a framework enabling the construction of IBE schemes that are secure under related-key attacks (RKAs). Specific instantiations of the framework yield RKA-secure IBE schemes for sets of related key derivation functions that are non-linear, thus overcoming a current barrier in RKA security. In particular, we obtain IBE schemes that are RKA secure for sets consisting of all affine funct...

Journal: :IEEE Transactions on Information Theory 2013

An eternal $m$-secure set of a graph $G = (V,E)$ is aset $S_0subseteq V$ that can defend against any sequence ofsingle-vertex attacks by means of multiple-guard shifts along theedges of $G$. A suitable placement of the guards is called aneternal $m$-secure set. The eternal $m$-security number$sigma_m(G)$ is the minimum cardinality among all eternal$m$-secure sets in $G$. An edge $uvin E(G)$ is ...

Journal: :Journal of Computational and Applied Mathematics 2021

The star-discrepancy is a quantitative measure for the irregularity of distribution point set in unit cube that intimately linked to integration error quasi-Monte Carlo algorithms. These popular rules are nowadays also applied very high-dimensional problems. Hence multi-dimensional sets reasonable size with low discrepancy badly needed. A seminal result from Heinrich, Novak, Wasilkowski and Woź...

Journal: :Fuzzy Sets and Systems 2006
Nehad N. Morsi Wafik Boulos Lotfallah Moataz Saleh El-Zekey

This derivation of (2) is not valid, because this duality applies to inferences and theorems only, not to definitions. In fact, (1) should be treated as an axiom. Accordingly, the duality of Lemma 3.3.1 would not be valid until the dual (2) of (1) is proved independently, as we do below. Our new proof will make use of Proposition 3.3.3, the original proof of which is based on duality. So, we mu...

Journal: :Fuzzy Sets and Systems 2011
Javier Gutiérrez García Salvador Romaguera

Answering a recent question posed by Gregori, Morillas and Sapena (“On a class of completable fuzzy metric spaces”, Fuzzy Sets and Systems, 161 (2010), 2193–2205) we present two examples of non strong fuzzy metrics (in the sense of George and Veeramani).

Journal: :Fuzzy Sets and Systems 2010
Javier Gutiérrez García Ulrich Höhle María Angeles de Prada-Vicente

We provide an extension of the notion of chain-valued frame introduced by Pultr and Rodabaugh in [Category theoretic aspects of chain-valued frames: parts I and II, Fuzzy Sets and Systems 159 (2008) 501–528 and 529–558] by relaxing the assumption that L be a complete chain. As a result of this investigation we formulate the category L-Frm of L-frames under the weaker assumption that L is a comp...

Journal: :Inf. Sci. 2007
Jerry M. Mendel

In this state-of-the-art paper, important advances that have been made during the past five years for both general and interval type-2 fuzzy sets and systems are described. Interest in type-2 subjects is worldwide and touches on a broad range of applications and many interesting theoretical topics. The main focus of this paper is on the theoretical topics, with descriptions of what they are, wh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید