نتایج جستجو برای: multiple byte fault

تعداد نتایج: 821636  

Journal: :ACM SIGCOMM Computer Communication Review 1997

Journal: :Transactions of the Association for Computational Linguistics 2022

Abstract Most widely used pre-trained language models operate on sequences of tokens corresponding to word or subword units. By comparison, token-free that directly raw text (bytes characters) have many benefits: They can process in any out the box, they are more robust noise, and minimize technical debt by removing complex error-prone preprocessing pipelines. Because byte character longer than...

Journal: :International Journal of Computer Network and Information Security 2021

A blockchain, or in other words a chain of transaction blocks, is distributed database that maintains an ordered blocks reliably connect the information contained them. Copies are usually stored on multiple computers and synchronized accordance with rules building which provides secure change-resistant storage information. To build linked lists hashing used. Hashing special cryptographic primit...

1999
Fauzan Mirza Sean Murphy

The byte block cipher Two sh was proposed as a candidate for the Advanced En cryption Standard AES This paper notes the following two properties of the Two sh key schedule Firstly there is a non uniform distribution of byte whitening subkeys Sec ondly in a reduced xed Feistel round function Two sh with an byte key there is a non uniform distribution of any byte round subkey An example of two di...

Leila Shahmohamadi Mahdi AliyariShoorehdeli Sharareh Talaie

In this study, detection and identification of common faults in industrial gas turbines is investigated. We propose a model-based robust fault detection(FD) method based on multiple models. For residual generation a bank of Local Linear Neuro-Fuzzy (LLNF) models is used. Moreover, in fault detection step, a passive approach based on adaptive threshold is employed. To achieve this purpose, the a...

Journal: :International journal of interactive mobile technologies 2023

The highest way to protect data from intruder and unauthorized persons has become a major issue. This matter led the development of many techniques for security, such as Steganography, Cryptography, Watermarking disguise data. paper proposes an image steganography method using Least Significant Bits (LSB) technique XOR operator secret key, through which key is transformed into one-dimensional b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید