نتایج جستجو برای: مقیاس macs
تعداد نتایج: 34091 فیلتر نتایج به سال:
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detecting the in-field compromised nodes, which may collect sufficient number of keyed message authentication codes (MAC). An in-field attack proof mechanism is presented in this paper. The MAC delivery mechanism makes the...
Magnetic-activated cell sorting (MACS) using paramagnetic annexin V-conjugated microbeads eliminates spermatozoa with externalized phosphatidylserine, which is considered one of the features of apoptosis. The objective of this study was to evaluate sperm recovery following the use of MACS as a sperm preparation technique. Mature spermatozoa were separated and divided into two fractions: the fir...
Reducing an automobile’s energy consumption will lower its dependency on fossil fuel and extend the travel range of electric vehicles. Automobile Climate Control Systems (CCS) are known to be heavy energy consumers. To help reduce CCS energy consumption, this paper presents an adaptive automated agent, MDP Agent for Climate control Systems (MACS), which provides drivers with advice as to how to...
[Purpose] The purpose of this study was to evaluate the functioning, extent of activity, and participation of school-aged children with cerebral palsy (CP) using the Manual Ability Classification System (MACS). [Subjects and Methods] The Subjects were 57 school-aged children (7-12 years old) with CP. The MACS, Gross Motor Function Measure (GMFM), International Classification of Functioning, Dis...
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery attacks on MACs. Subsequently an overview is presented of most MAC constructions and on attacks on these algorithms. The MACs described include CBC-MAC and its variants, the MAC algorithms derived from cryptographic ha...
Background: Selection of human spermatozoa prior to assisted reproduction is currently based on motility and morphology. Recently, Zeta method has been introduced for normal sperm selection based on sperm surface charges. In addition, one of the features of apoptosis is the externalization of phosphatidylserine (PS), which are normally present on the inner leaflet of the sperm plasma membrane. ...
OBJECTIVE To review the incidence of respiratory conditions and their effect on mortality in HIV-infected and uninfected individuals prior to and during the era of highly active antiretroviral therapy (HAART). DESIGN Two large observational cohorts of HIV-infected and HIV-uninfected men (Multicenter AIDS Cohort Study [MACS]) and women (Women's Interagency HIV Study [WIHS]), followed since 198...
Among various cryptographic schemes, CBC-based MACs belong to the few ones most widely used in practice. Such MACs iterate a blockcipher EK in the so called Cipher-Block-Chaining way, i.e. Ci = EK(Mi⊕Ci−1) , offering high efficiency in practical applications. In the paper, we propose a new deterministic variant of CBC-based MACs that is provably secure beyond the birthday bound. The new MAC 3kf...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید