نتایج جستجو برای: most importantly

تعداد نتایج: 1514991  

Journal: :Revista Internacional de Investigación en Ciencias Sociales 2020

Journal: :journal of herbal drugs 0
hassan mirmohammadi department of clinical science, faculty of veterinary medicine, islamic azad university of shahrekord, shahrekord, iran saam torkan department of clinical science, faculty of veterinary medicine, islamic azad university of shahrekord, shahrekord, iran mohsen jafarian dehkordi department of clinical science, faculty of veterinary medicine, islamic azad university of shahrekord, shahrekord, iran

introduction and goal: today, the researchers have found that many recent diseases are due to cellular oxidative stress which is caused by the imbalance of the formation and neutralization of free radicals. including weak immune system, cancers, inflectional diseases, aging body and diabetes. diabetes is the most common endocrine disease in the world that is referred to as the mother of the dis...

Journal: :فقه پزشکی 0
fatemeh taherkhani

although passing the method of embryo donation to sterile spouses act in 2003 was a positive step toward regularizing one of assisted reproduction methods, but it may be criticized due to some vagueness in its content, lack of sanction, and referring many essential issues to bylaw.  one of the most important problems of this act is that it does not clarity parentage and the legal effects of emb...

Journal: :ادب عربی 0
علی نجفی ایوکی استادیار دانشگاه کاشان

one of the most common and appealing issues grabbing the attention of the critics of contemporary arabic literature is innuendo and its applications which are not much attended to by persian speakers. in this paper we have focused on innuendo and its applications. the questions we have raised and have attempted to respond to include: what is niq?b (innuendo) and where do its roots lie? what is ...

Journal: :IJDCF 2013
Ikuesan R. Adeyemi Shukor Abd Razak Nor Amira Nor Azhan

Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as ...

2012
B.Ramesh Kumar Raja Krishna Kumar

Steganography is the concept of embedding information in such a way that its existence is concealed. In this paper we have shown one of the techniques used in Steganography to hide information and deliver the message to the end user using Bit-planes without any loss of data. The method used is to replace lowest 3 or 4 LSB with message bits or image data (assume 8 bit values). We do this method ...

2006
Min Feng Bin B. Zhu Cunlai Zhao Shipeng Li

Comb method is an efficient method to calculate point multiplication in elliptic curve cryptography, but vulnerable to power-analysis attacks. Various algorithms have been proposed recently to make the comb method secure to power-analysis attacks. In this paper, we present an efficient comb method and its Simple Power Analysis (SPA)-resistant counterpart. We first present a novel comb recoding ...

2013
Hongwei Bi Jean-François Delmas HONGWEI BI

We consider a stationary continuous model of random size population with non-neutral mutations using a continuous state branching process with non-homogeneous immigration. We assume the type (or mutation) of the immigrants is random given by a constant mutation rate measure. We determine some genealogical properties of this process such as: distribution of the time to the most recent common anc...

2003
Hung-Chi Fang Tu-Chih Wang Yu-Wei Chang Ya-Yun Shih Liang-Gee Chen

In this work, a novel word-level algorithm of the embedded block codingin P E G 2000 is proposed. Unlike conventional approaches, all bitplanes of coefficients are processed in parallel in the proposed algorithm. The algorithm is based on the observations and the analysis of the significant state of a coefficient and its contribution to neighbors. As a result of the analysis, there is only the ...

Journal: :IACR Cryptology ePrint Archive 2016
Jung Hee Cheon Andrey Kim Miran Kim Yong Soo Song

Our paper suggests a general method to construct a Floating-Point Homomorphic Encryption (FPHE) scheme that allows the floating-point arithmetics of ciphertexts, thus computing encryptions of most significant bits of m1+m2 and m1m2, given encryptions of floating-point numbers m1 and m2. Our concrete construction of leveled FPHE based on BGV scheme is almost optimal in the sense of noise growth ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید