نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

1995
TAKESI KAWASAKI T. KAWASAKI

The Macaulayfication of a Noetherian scheme X is a birational proper morphism Y → X such that Y is a CohenMacaulay scheme. Of course, a desingularization is a Macaulayfication and Hironaka gave a desingularization of arbitrary algebraic variety over a field of characteristic 0. In 1978 Faltings gave a Macaulayfication of a quasi-projective scheme whose nonCohen-Macaulay locus is of dimension 0 ...

2002
M. R. Kaazempur-Mofrad

Conventional Galerkin-based finite element algorithms perform poorly when modeling advective transport. Here we develop and test a characteristic Galerkin scheme to solve the unsteady three-dimensional advective transport equation. The algorithm uses tracking of the Gaussian quadrature points to project the information from the Eulerian background grid to the Lagrangian grid. Numerical experime...

2015
TONG ZHANG JINYUN YUAN J. Y. YUAN

Abstract. In this article, a characteristic scheme is considered for the viscoelastic Oldroyd fluid flows based on the lowest equal-order finite element pair. The diffusion term in these equations is discretized by using finite element method, the temporal differentiation and advection terms are treated by characteristic scheme and the integral term is handled by applying right rectangle rule. ...

Journal: :Des. Codes Cryptography 1998
Volker Müller Scott A. Vanstone Robert J. Zuccherato

We present a key exchange scheme similar to that of Diie and Hellman using the infrastructure of quadratic function elds of even characteristic. This is a modiication of the results of Scheidler, Stein and Williams who used quadratic function elds of odd characteristic. We also extend these results to give a digital signature scheme similar to that of ElGamal. These schemes are possible in this...

2009
Xinxia Song Zhigang Chen Qian Hu

We propose a new threshold signature scheme based on conic curve. The security of the proposed threshold signature scheme is based on the difficulty of computing the DLP in conic curve groups. It can resist some of the known attacks. Since an exciting characteristic of conic is both encoding and decoding over conic are easily implemented, it can be used in the mobile payment system with the lim...

2007
Guo-Shiang Lin Sin-Kuo Daniel Chai Wei-Cheng Yeh Lin-Jie Cheng

In this paper, we propose a scheme composed of the spatial and inter-slice analyses to achieve tumor region identification in MRI breast images. Our spatial analysis evaluates the intensity and size information of candidate regions, while the inter-slice analysis is based on the continuity characteristic to verify the static behavior of tumor regions. To find a precise region, a region growing ...

Journal: :IACR Cryptology ePrint Archive 2017
Dustin Moody Ray A. Perlner Daniel Smith-Tone

In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes which utilize the structure of a large matrix algebra to construct effectively invertible systems of nonlinear equations hidden by an isomorphism of polynomials. One promising approach to cryptanalyzi...

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

Journal: :amirkabir international journal of electrical & electronics engineering 2013
f. haghjoo m. mostafaei m. mohammadzadeh

internal turn-turn faults (ttf) are the most common failures in power transformers, which could seriously reduce their life expectancy. although common protection schemes such as current-baseddifferential protection are able to detect some of the internal faults, some other minor ones (such as ttfs andshort circuit near the neutral point) cannot be detected by such schemes. likewise, these rela...

2003
Sungchang Kim JinSeek Choi Minho Kang

We address the control plane architecture of how to provide advance quality of service (QoS) in optical burst switching networks based on dynamic wavelength assignment. Unlike existing QoS guaranteeing scheme, such as buffer-based and offset-time based scheme, our proposed dynamic virtual lambda partitioning (DVLP) scheme does not mandate any buffer or extra offset time, but can achieve better ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید