نتایج جستجو برای: kourosh s method

تعداد نتایج: 2251869  

2013
Dan M. Scott

A new technique for performing the bilinear transformation of polynomials is presented. The technique is both simple to understand as well as efficient in its computer implementation. The key to the method is the way in which the successive derivatives of a particular polynomial are computed. A simple recursion formula is used which can be done either by hand, if desired, or by computer. The or...

2010
Petr TESAŘ

Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of crypto-attacks has led to the development of criteria for repelling such attacks. The non-linearity criterion provides some protection against wellknown attacks, such as linear cryptanalysis and differential cryptanalysis. The open problem is constructed by generating methods which will be rapid...

Journal: :CoRR 2012
Sohail Abid Shahid Abid

This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encrypti...

2012
Massimiliano Margonari

In this paper we present an unsupervised text classification method based on the use of a self organizing map (SOM). A corpus of roughly 200 plain text documents have been considered. Some Scilab scripts have been prepared to read and process these documents, train the neural network and graphically render the

Journal: :JIPS 2006
Jin-Hyuk Yang In-Jeong Chung

We present in this paper the methodology for automatic generation of OWL-S service model ontology along with the results and issues. First, we extract information related to atomic services and their properties such as IOPE from the UML class diagram, and retrieve information related to the composition of services from the UML state-chart diagram. Then, the XSLT applications utilize the acquire...

Journal: :Analytical chemistry 2015
Stephanie H Urióstegui Richard K Bibby Bradley K Esser Jordan F Clark

Cosmogenic sulfur-35 in water as dissolved sulfate ((35)SO4) has successfully been used as an intrinsic hydrologic tracer in low-SO4, high-elevation basins. Its application in environmental waters containing high SO4 concentrations has been limited because only small amounts of SO4 can be analyzed using current liquid scintillation counting (LSC) techniques. We present a new analytical method f...

2010
A. Schäfer

For a one-dimensional complex-valued function/this paper deals with iterative root finding methods using divided differences of /. Assuming that / is given in a Newtonian representation we show how Homer-like transformations ("shift transformations") yield the divided differences needed in each iteration step. In particular, we consider an iteration method given by Larkin [5] and derive an equi...

2000
Kohji Dohsaka Norihito Yasuda Noboru Miyazaki Mikio Nakano Kiyoaki Aikawa

This paper presents a novel method that controls a dialogue between a spoken dialogue system and a user efficiently so that the system responds as helpfully as possible within the limits of its knowledge. Due to speech recognition errors, a system and user must engage in a “confirmation dialogue” to clarify a user’s request. Although a confirmation dialogue is unavoidable, it should be as conci...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید