نتایج جستجو برای: nine weaknesses
تعداد نتایج: 221784 فیلتر نتایج به سال:
Synchronous stream cipher HENKOS is proposed by Marius Oliver Gheorghit to eprint for analyzing the algorithm by cryptologic community. At the first look of HENKOS, it can be observed that a 256 byte secret key is an undesirable quality of the algorithm. Also, the algorithm is not efficient in case of streaming data that has to encrypt instantaneously, this is because the algorithm generates a ...
We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better underst...
Platt’s 1964 paper “Strong Inference” (SI), published in Science, has had considerable influence upon the conception of the nature of the scientific method held in both the social and physical sciences. Platt suggests that a four-step method of specifying hypotheses and conducting critical experiments that systematically eliminate alternatives has been responsible for progress in the history of...
This paper compares nine common specialization indices, discussing their properties, strengths and weaknesses. In order to unravel the differences between the indices they are applied to European employment structures in 2005, spanning 51 industries and 24 European countries. The resulting heterogeneity levels differ largely between relative and absolute specialization measures, but also within...
Blind predictions of the local structure of nine CASP2 targets were made using the I-sites library of short sequence--structure motifs, revealing strengths and weaknesses in this new knowledge-based method. Many turns between secondary structural elements were accurately predicted. Estimates of the confidence of prediction correlated well with the accuracy over the whole set. Bias toward struct...
In this article a maturity model is proposed, named OD-MM (Open Data Maturity Model) to assess the commitment and capabilities of public agencies in pursuing the principles and practices of open data. The OD-MM model has a three level hierarchical structure, called domains, sub-domains and critical variables. Four capacity levels are defined for each of the 33 critical variables distributed in ...
Background and Objectives: The commercial layer chicken farming is one of the most important sectors of the poultry industry. This study was conducted to evaluate the status of biosecurity of commercial layer chicken farms in 9 Iranian provinces with the highest layer chicken population. Methods: In this cross-sectional study, 202 commercial layer chicken farms were selected from nine Irani...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید