نتایج جستجو برای: most importantly
تعداد نتایج: 1514991 فیلتر نتایج به سال:
introduction and goal: today, the researchers have found that many recent diseases are due to cellular oxidative stress which is caused by the imbalance of the formation and neutralization of free radicals. including weak immune system, cancers, inflectional diseases, aging body and diabetes. diabetes is the most common endocrine disease in the world that is referred to as the mother of the dis...
although passing the method of embryo donation to sterile spouses act in 2003 was a positive step toward regularizing one of assisted reproduction methods, but it may be criticized due to some vagueness in its content, lack of sanction, and referring many essential issues to bylaw. one of the most important problems of this act is that it does not clarity parentage and the legal effects of emb...
one of the most common and appealing issues grabbing the attention of the critics of contemporary arabic literature is innuendo and its applications which are not much attended to by persian speakers. in this paper we have focused on innuendo and its applications. the questions we have raised and have attempted to respond to include: what is niq?b (innuendo) and where do its roots lie? what is ...
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as ...
Steganography is the concept of embedding information in such a way that its existence is concealed. In this paper we have shown one of the techniques used in Steganography to hide information and deliver the message to the end user using Bit-planes without any loss of data. The method used is to replace lowest 3 or 4 LSB with message bits or image data (assume 8 bit values). We do this method ...
Comb method is an efficient method to calculate point multiplication in elliptic curve cryptography, but vulnerable to power-analysis attacks. Various algorithms have been proposed recently to make the comb method secure to power-analysis attacks. In this paper, we present an efficient comb method and its Simple Power Analysis (SPA)-resistant counterpart. We first present a novel comb recoding ...
We consider a stationary continuous model of random size population with non-neutral mutations using a continuous state branching process with non-homogeneous immigration. We assume the type (or mutation) of the immigrants is random given by a constant mutation rate measure. We determine some genealogical properties of this process such as: distribution of the time to the most recent common anc...
In this work, a novel word-level algorithm of the embedded block codingin P E G 2000 is proposed. Unlike conventional approaches, all bitplanes of coefficients are processed in parallel in the proposed algorithm. The algorithm is based on the observations and the analysis of the significant state of a coefficient and its contribution to neighbors. As a result of the analysis, there is only the ...
Our paper suggests a general method to construct a Floating-Point Homomorphic Encryption (FPHE) scheme that allows the floating-point arithmetics of ciphertexts, thus computing encryptions of most significant bits of m1+m2 and m1m2, given encryptions of floating-point numbers m1 and m2. Our concrete construction of leveled FPHE based on BGV scheme is almost optimal in the sense of noise growth ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید