نتایج جستجو برای: preserving maximum data strength
تعداد نتایج: 2825152 فیلتر نتایج به سال:
Abstract In this paper, we first define a primitive protocol of secure multiparty computations to privately compute the logic operator “OR” (SMC_OR). Accordingly, design feasible quantum SMC_OR by using single photons, which can achieve information-theoretical security in semi-honest model. Furthermore, adopt proposed solve an interesting but important privacy-preserving problem, i.e., finding ...
objective: the purpose of the study was to evaluate the influence of adding nanofiller particles to a dentin bonding agent on resin-dentin bond strength. materials and methods: fifty-four human intact premolar teeth were divided in to 6 groups of nine. the teeth were ground on occlusal surfaces and polished with 320 and then 600 grit silicon carbide papers. an experimental bonding system based ...
the purpose of this study was to investigate the interference effect of concurrent strength and endurance training on maximum strength and vo2max in non-athletes. for this purpose, 34 sedentary healthy men (mean age 22±1.18 years, height 173.61±6.48 cm, and weight 56.13±8.50 kg) voluntarily participated in this study. initially, subjects were randomly assigned to one of four training groups: st...
Photosynthetic unicellular organisms are considered as promising alternative protein sources. The aim of this study is to understand the extent to which these green sources differ with respect to their gross composition and how these differences affect the final protein isolate. Using mild isolation techniques, proteins were extracted and isolated from four different unicellular sources (Arthro...
crops and agricultural products are subject to natural loading during growth. different mechanical forces are also exerted on them during harvest. one product, sugar cane, experiences large shear forces are during harvest. an examination of the crop properties and machine parameters of sugar cane are necessary to develop appropriate cutting tools and the optimization and design of harvesting ma...
We present three different privacy preserving protocols for computing reputation. They vary in strength in terms of preserving privacy, however, a common thread in all three protocols is that they are fully decentralized and efficient. Our protocols that are resilient against semi-honest adversaries and non-disruptive malicious adversaries have linear and loglinear communication complexity resp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید