نتایج جستجو برای: msbs

تعداد نتایج: 93  

2012
Marc Joye Tancrède Lepoint

In 1998, Boneh, Durfee and Frankel described several attacks against RSA enabling an attacker given a fraction of the bits of the private exponent d to recover all of d. These attacks were later improved and extended in various ways. They however always consider that the private exponent d is smaller than the RSA modulus N . When it comes to implementation, d can be enlarged to a value larger t...

2006
Yunho Lee Heasuk Jo Seungjoo Kim Dongho Won

Resolving rightful ownerships of digital images is an active research area of watermarking. Though a watermark is used to prove the owner’s ownership, an attacker can invalidate it by creating his fake original image and its corresponding watermark. This kind of attack is called ambiguity attack and can be tackled either by use of non-invertible watermarking schemes or by use of zero-knowledge ...

Journal: :Scholar: pilot and validation studies 2023

Abstract Introduction Prior to matriculation, physician assistant students often need be certified in Basic Life Support. However, it is unknown whether they are aware of and can place a victim one specific life-saving method, the recovery position. This study evaluated students’ ability human Methods Students enrolled program (MSBS-PA) at midwestern university, entered simulated, multi-victim ...

Journal: :Mathematics 2021

This paper describes an attack on the Rivest, Shamir and Adleman (RSA) cryptosystem utilizing modulus N=p2q where p q are two large balanced primes. Let e1,e2<N? be integers such that d1,d2<N? their multiplicative inverses. Based key equations e1d1?k1?(N)=1 e2d2?k2?(N)=1 ?(N)=p(p?1)(q?1), our works when primes share a known amount of least significant bits (LSBs) private exponents most (M...

2002
René J. van der Vleuten

We present a method that extends lossless compression with the feature of finegranularity scalable near-lossless compression while preserving the high compression efficiency and low complexity exhibited by dedicated lossless compression methods when compared to the scalable compression methods developed for lossy image compression. The method operates by splitting the image pixel values into th...

Journal: :Sustainability 2022

Recently, emergency structures have been in the spotlight because of coronavirus disease (COVID-19) pandemic. This research examines use modular integrated construction (MiC) developing an hospital for individuals with novel coronavirus-infected pneumonia (NCIP). The whole process building is based on design and assembly idea. primary structure was constructed using steel buildings (MSBs) conce...

Journal: :IEEE Access 2023

The hiding capacity (HC), imperceptibility, and security are the 3 important quality measures for a steganography technique. While stego-image is on transit internet, hidden data may be changed because of various reasons. existing techniques does neither focus detecting errors in nor to correct data. Therefore, this article brings forward technique, wherein error detection correction can perfor...

2008
Richard Cronn Aaron Liston Matthew Parks David S. Gernandt Rongkun Shen Todd Mockler

Organellar DNA sequences are widely used in evolutionary and population genetic studies, however, the conservative nature of chloroplast gene and genome evolution often limits phylogenetic resolution and statistical power. To gain maximal access to the historical record contained within chloroplast genomes, we have adapted multiplex sequencing-by-synthesis (MSBS) to simultaneously sequence mult...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید