نتایج جستجو برای: k out of n
تعداد نتایج: 21287594 فیلتر نتایج به سال:
this study was designed and conducted to find out if there is any significant relationship between iranian efl learners preferance for one of the three degrees of obtrusiveness in foreign language instruction (focus on form, forms and meaning) and their preferred experiential learing style. to collect the data two questionnaires were used. the first one on the degree of obtrusiveness and the se...
thermal barrier coatings (tbcs) are used to provide thermal insulation to the hot section components of gas turbines in order to enhance the operating temperature and turbine efficiency. hot corrosion and thermal shocks are the main destructive factors in tbcs which comes as a result of oxygen and molten salt diffusion into the coating. in this thesis atmospheric plasma spraying was used to dep...
This study was carried out in order to evaluate the changes of Nitrogen, phosphor and potassium uptake by wheat and remaining of them in soil under foliar application of Leonardite and foliar application of N and K. The experiment was conducted in Gorgan University of Agricultural Sciences and Natural Resources during 2013- 2014. The experiment was laid out a using split-plot arrangement based ...
We apply the algebraic reliability method to analysis of several variants multi-state k-out-of-n systems. describe and use ideals consecutive systems with without sparse, show results computer experiments on these kinds also give an weighted that this provides efficient algorithms for computation their reliability.
in the new production systems, finding a way to improving the product and system reliability in design is a very important. The reliability of the products and systems may improve using different methods. One of this methods is redundancy allocation problem. In this problem by adding redundant component to sub-systems under some constraints, the reliability improved. In this paper we worked on ...
Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n−k goods. In this paper, we propose several efficient two-round k-out-of-n oblivious transfer schemes, in whic...
This paper presents a new efficient protocol for k-out-of-n oblivious transfer which is a generalization of Parakh's 1-out-of-2 oblivious transfer protocol based on Diffie-Hellman key exchange. In the proposed protocol, the parties involved generate Diffie-Hellman keys obliviously and then use them for oblivious transfer of secrets.
A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication cost of our scheme are n+1 messages of sender to receiver and k messages from the receiver to sender. To the best knowledge of the authors, the communication complexity of our scheme is the least. Also, our scheme has a lower computation cost with (k+1)n modular exponentiations for sender and 3k modular e...
Audio cryptography is same like a visual cryptography. A plain data (audio file) is split into two or more shares. Each single share does not convey any meaning but when shares are combined together they will reveal the original data. In Audio cryptography the "plaintext" is an audio File. k out of n Nonbinary Audio Cryptography scheme is a special type of secret sharing scheme which is more se...
REFERENCES A. Mahmood and E. J . McCluskey, “Concurrent error detection using watchdog processorA survey,” IEEE Trans. Cornput., vol. C-37, no. 2, pp. 160-174, Feb. 1988. M. Schuette and J . Shen, “Processor control flow monitoring using signatured instruction streams,” IEEE Trans. Cornput., vol. C-36, no. 3 , pp. 264-276, Mar. 1987. N. R. Saxena and E. J. McCluskey, “Extended precision checksu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید