نتایج جستجو برای: k out of n

تعداد نتایج: 21287594  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

this study was designed and conducted to find out if there is any significant relationship between iranian efl learners preferance for one of the three degrees of obtrusiveness in foreign language instruction (focus on form, forms and meaning) and their preferred experiential learing style. to collect the data two questionnaires were used. the first one on the degree of obtrusiveness and the se...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه مواد و انرژی - پژوهشکده سرامیک 1392

thermal barrier coatings (tbcs) are used to provide thermal insulation to the hot section components of gas turbines in order to enhance the operating temperature and turbine efficiency. hot corrosion and thermal shocks are the main destructive factors in tbcs which comes as a result of oxygen and molten salt diffusion into the coating. in this thesis atmospheric plasma spraying was used to dep...

Ebrahim Zeinali Elnaz Azizzadeh Ghorban Ali Roshani Seyed Ali Reza Movahedi Naeini

This study was carried out in order to evaluate the changes of Nitrogen, phosphor and potassium uptake by wheat and remaining of them in soil under foliar application of Leonardite and foliar application of N and K. The experiment was conducted in Gorgan University of Agricultural Sciences and Natural Resources during 2013- 2014. The experiment was laid out a using split-plot arrangement based ...

Journal: :Mathematics 2021

We apply the algebraic reliability method to analysis of several variants multi-state k-out-of-n systems. describe and use ideals consecutive systems with without sparse, show results computer experiments on these kinds also give an weighted that this provides efficient algorithms for computation their reliability.

mani sharifi, mohammadreza shahriari Pedram Pourkarim Guilani,

in the new production systems, finding a way to improving the product and system reliability in design is a very important. The reliability of the products and systems may improve using different methods. One of this methods is redundancy allocation problem. In this problem by adding redundant component to sub-systems under some constraints, the reliability improved. In this paper we worked on ...

2008
Cheng-Kang Chu Wen-Guey Tzeng

Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n−k goods. In this paper, we propose several efficient two-round k-out-of-n oblivious transfer schemes, in whic...

Journal: :CoRR 2009
Ashwin Jain C. Hari

This paper presents a new efficient protocol for k-out-of-n oblivious transfer which is a generalization of Parakh's 1-out-of-2 oblivious transfer protocol based on Diffie-Hellman key exchange. In the proposed protocol, the parties involved generate Diffie-Hellman keys obliviously and then use them for oblivious transfer of secrets.

Journal: :IACR Cryptology ePrint Archive 2015
Qinglong Wang

A new k-out-of-n oblivious transfer protocol is presented in this paper. The communication cost of our scheme are n+1 messages of sender to receiver and k messages from the receiver to sender. To the best knowledge of the authors, the communication complexity of our scheme is the least. Also, our scheme has a lower computation cost with (k+1)n modular exponentiations for sender and 3k modular e...

2013
Shubhangi Suryawanshi

Audio cryptography is same like a visual cryptography. A plain data (audio file) is split into two or more shares. Each single share does not convey any meaning but when shares are combined together they will reveal the original data. In Audio cryptography the "plaintext" is an audio File. k out of n Nonbinary Audio Cryptography scheme is a special type of secret sharing scheme which is more se...

Journal: :IEEE Trans. Computers 1990
Ming-Feng Chang Weiping Shi W. Kent Fuchs

REFERENCES A. Mahmood and E. J . McCluskey, “Concurrent error detection using watchdog processorA survey,” IEEE Trans. Cornput., vol. C-37, no. 2, pp. 160-174, Feb. 1988. M. Schuette and J . Shen, “Processor control flow monitoring using signatured instruction streams,” IEEE Trans. Cornput., vol. C-36, no. 3 , pp. 264-276, Mar. 1987. N. R. Saxena and E. J. McCluskey, “Extended precision checksu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید