نتایج جستجو برای: key block method

تعداد نتایج: 2235566  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم 1392

در سال های اخیر طرح های پیش توزیع کلید برای شبکه های حسگر توزیع شده با توجه به کاربرد فراوان این شبکه ها در دو حوزه نظامی و غیر نظامی، مورد توجه قابل ملاحظه ای قرار گرفته است. در این طرح ها کلیدها قبل از استقرار این شبکه ها در داخل هر گره حسگر قرار می گیرند. در این پایان نامه یک روش ساخت جدید برای این طرح ها بر پایه ترکیبی از دوگان طرح های بلوکی استاندارد ‎‏را بررسی می کنیم. این روش دارای طیف گ...

2017
Xudong Li Defeng Sun Kim-Chuan Toh

For a symmetric positive semidefinite linear system of equations Qx = b, where x = (x1, . . . , xs) is partitioned into s blocks, with s ≥ 2, we show that each cycle of the classical block symmetric Gauss-Seidel (block sGS) method exactly solves the associated quadratic programming (QP) problem but added with an extra proximal term of the form 12‖x−x ‖T , where T is a symmetric positive semidef...

2013
Byong Seok Min Dong Kyun Lim Seung Jong Kim Joo Heung Lee

Histogram equalization, which stretches the dynamic range of intensity, is the most common method for enhancing the contrast of image. Contrast Limited Adaptive Histogram Equalization (CLAHE), proposed by K. Zuierveld, has two key parameters: block size and clip limit. These parameters are mainly used to control image quality, but have been heuristically determined by users. In this paper, we p...

2012
Neeraj Khanna Dripto Chatterjee Asoke Nath Joyshree Nath Saima Ghosh Meheboob Alam Soumitra Mondal Suvadeep Dasgupta Sayantan Chakraborty Amlan Chakrabarti Sankar Das Shalabh Agarwal

In the present paper the authors have introduced a new symmetric key cryptographic method called Bit Level Encryption Standard(BLES) which is based on bit exchanging or bit reshuffling method. The authors have introduced a completely new bit level encryption method. Nath et. al has already developed bit manipulation method called NJJSAA where the authors mainly used bit level right shift, bit l...

Journal: :IEICE Transactions 2009
Kazuki Kondo Seiji Hotta

In this paper, we propose block matching and learning for color image classification. In our method, training images are partitioned into small blocks. Given a test image, it is also partitioned into small blocks, and mean-blocks corresponding to each test block are calculated with neighbor training blocks. Our method classifies a test image into the class that has the shortest total sum of dis...

2009
Fudziah Ismail Md. Amin

This study focused mainly on the derivation of the 2 and 3-point block methods with constant coefficients for solving special second order ordinary differential equations directly based on Newton-Gregory backward interpolation formula. The performance of the new methods was compared with the conventional 1-point method using a standard set of test problems. Numerical results were presented to i...

2008
Andrey Pyshkin

This thesis investigates the application of Gröbner bases to cryptanalysis of block ciphers. The basic for the application is an algorithm for solving systems of polynomial equations via Gröbner basis computation. In our case, polynomial equations describe the key recovery problem for block ciphers, i.e., the solution of these systems corresponds to the value of the secret key. First we demonst...

2014
Mohamed Abaza Raed Mesleh Ali Mansour El-Hadi M. Aggoune

This paper investigates the bit error rate (BER) performance of spatial diversity free-space optical (FSO) communication systems using on-off keying modulation. The study considers correlated log-normal FSO channels as well as path losses due to weather effects using intensity modulation and direct detection schemes. An approximated moment generating functions (MGF) for the joint probability de...

Journal: :تحقیقات بازاریابی نوین 0
hon-yu ma ching-chuan lin

although many scholars have proposed all kinds of key successful factors (ksfs) for erp activity to smoothly enhance the implementation of erp, the ksfs are based too much on concept and protocol cannot help an enterprise to achieve this objective. therefore, this research through qualitative interview method, integrating the ksfs and dynamic capability to set up a model so as to exhibit the ki...

Journal: :physical chemistry research 2013
mahdi rezaei sameti

abstract the structural and electrostatic properties of the single-walled two representative (8, 0) zigzag and (4, 4) armchair models of pristine and gaas-doped on boron phosphide nanotubes (bpnts) was investigated by calculating the nuclear magnetic resonance tensors and with performing the density function theory. the geometrical structures of all representative pristine and gaas-doped models...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید