نتایج جستجو برای: most importantly

تعداد نتایج: 1514991  

1998
Doron ZEILBERGER

It is way too soon to teach our computers how to become full-fledged humans. It is even premature to teach them how to become mathematicians, it is even unwise, at present, to teach them how to become combinatorialists. But the time is ripe to teach them how to become experts in a suitably defined and narrowly focused subarea of combinatorics. In this article, I will describe my efforts to teac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده جغرافیا 1392

the west of esfahan province, iran, is one of the most important agricultural areas throughout the country due to the climate variability and life-giving water of zayanderood river. rice is one of the major and economic crops in this area. the most important climatic elements in agricultural activities which should be considered include temperature, relative humidity, precipitation and wind. so...

Journal: :CoRR 2016
M. Hassan Najafi David J. Lilja

This work proposes a high-capacity scheme for separable reversible data hiding in encrypted images. At the sender side, the original uncompressed image is encrypted using an encryption key. One or several data hiders use the MSB of some image pixels to hide additional data. Given the encrypted image containing this additional data, with only one of those data hiding keys, the receiver can extra...

2017
Jie Hu Na Zhang Wenzhao Liu Juanjuan Shan

At present, fresh agricultural products have begun to take the scale of industrialization, the majority have been in full accordance with high yield and high quality, efficient and safe production requirements, but due to the characteristics of fresh agricultural products, more and more attention have been aroused, the traditional marketing model is facing a bottleneck, the various aspects of n...

2005
Matthias Ernst Ellen Jochemsz Alexander May Benne de Weger

We present several attacks on RSA that factor the modulus in polynomial time under the condition that a fraction of the most significant bits or least significant bits of the private exponent is available to the attacker. Our new attacks on RSA are the first attacks of this type that work up to full size public or private exponent.

2006
GEOFF A. BOXSHALL

Phylogenetic relationships between the known genera of the order Misophrioida permit the identi® cation of two lineages: one consisting of the family Misophriidae Brady, 1878 which comprises seven genera, and a new, monotypic family, the Palpophriidae Boxshall & Jaume, 1999; the other consisting of another new family, the SpeleophriidaeBoxshall & Jaume, 1999, comprising eight genera. Habitat ex...

2016
Barak Shani

This paper gives the first bit security result for the elliptic curve Diffie–Hellman key exchange protocol for elliptic curves defined over prime fields. About 5/6 of the most significant bits of the x-coordinate of the Diffie–Hellman key are as hard to compute as the entire key. A similar result can be derived for the 5/6 lower bits. The paper also generalizes and improves the result for ellip...

Journal: :Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society 2008
Wen-Bin Chiou

The negative impact of Internet use on adolescents has received much popular attention and has also become a popular research topic. How to induce adolescent players to change their attitudes toward online gaming is one of the most important issues in online gaming addiction. The present study is based on the less-leads-to-more effect of dissonance theory. Experimental research was conducted to...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2002
Vasily G. Moshnyaga

In this paper, we propose a new architectural technique to reduce energy dissipation of frame memory through adaptive bitwith compression. Unlike related approaches, the technique utilizes the fixed order of memory accesses and data correlation of video sequences by dynamically adjusting the memory bitwidth to the number of bits changed per pixel. Instead of treating data bits independently, we...

Journal: :J. Information Security 2012
Adel Hammad Abusitta

A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید