نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

2014
Bin Mu

With the rapid growth of the volume and diversity of digital data produced by all kinds of commercial, scientific and leisure-time applications, the extraction of useful information from these large data sets has become one of the key IT tasks. On the other hand, the constant monitoring of people’s activities, while using these applications, has raised people’s concern about the invasiveness of...

Journal: :Mathematical and Computer Modelling 2007
A. Thavaneswaran Kulathava Ranee Thiagarajah S. S. Appadoo

Recently, Carlsson and Fuller [C. Carlsson, R. Fuller, On possibilistic mean value and variance of fuzzy numbers, Fuzzy Sets and Systems 122 (2001) 315–326] have introduced possibilistic mean, variance and covariance of fuzzy numbers and Fuller and Majlender [R. Fuller, P. Majlender, On weighted possibilistic mean and variance of fuzzy numbers, Fuzzy Sets and Systems 136 (2003) 363–374] have in...

Journal: :Fuzzy Sets and Systems 2014
Masayuki Takahashi Toshiaki Murofushi Shin Asahina

This paper is a brief summary of “M.Takahashi, T.Murofushi, S.Asahina, A new necessary and sufficient condition for the Egoroff theorem in non-additive measure theory, Fuzzy Sets and Systems, to appear.” This paper states that a newly defined condition, called condition (M), is a necessary and sufficient condition for the Egoroff theorem in non-additive measure theory. The existing necessary an...

Journal: :IEEE Transactions on Information Forensics and Security 2022

It has been shown that the SK scheme, which was proposed by Schalkwijk and Kailath, is a self-secure capacity-achieving (SSCA) feedback scheme for Gaussian wiretap channel, i.e., not only achieves capacity of but also secure itself secrecy channel. For multi-user channels, very recently, it Ozarow’s two-user multiple-access channel (GMAC) SSCA (GMAC-WT). In this paper, first, we propose GMAC-WT...

2012
George Moldovan Anda Ignat

We present an efficient protocol which, under certain assumptions, provides a suitable level of security and anonymity in the ideal cipher model when computing the intersection of two private data-sets containing lists of elements from a large domain. The assumptions are that each node is pre-loaded with a set of pseudonyms, signed by the network’s trusted authority; that the cardinality of eac...

2014
S. K. Bhardwaj

The increasing demand for high secure and reliable authentication schemes, led to improvement in unimodal biometric system and hence multimodal biometric system has emerged as a mean of more secure and reliable authentication scheme. Multimodal biometric fusion is very promising process to enhances the strengths and reduce the weaknesses of the individual measurements. In multimodal biometrics,...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم پایه 1389

در این رساله برای چندجمله ای های درجه ی دوم با مجموعه ی ژولیای همبند موضعی; ثابت خواهیم کرد: اندازه برولین مجموعه نقاط از دو سو دست یافتنی در چندجمله ای های درجه دو برابر با صفر است مگر چندجمله ای چبی شف که برابر با یک است. و برای چندجمله ای های درجه دوم با نقاط ثابت خنثی غیر گویا ثابت خواهیم کرد: 1)هر نقطه ی از دو سو دست یافتنی در حالت زیگل نهایتا به نقطه ی بحرانی و در حالت کرمر به نقطه ث...

1993
Kevin N. Otto Andrew D. Lewis Erik K. Antonsson

Consider sets X and Y each with associated membership functions. Further suppose that there is a map f : X → Y . A membership may be induced onY from the membership ofX calculated using the extension principle, and the two memberships on Y may be combined to give an overall membership. The point with the highest membership in X can be determined directly or by back mapping the value with the hi...

Journal: :Appl. Math. Lett. 2008
Yu-Ru Syau Ly Fie Sugianto E. Stanley Lee

The concept of upper and lower semicontinuity of fuzzy mappings introduced by Bao and Wu [Y.E. Bao, C.X. Wu, Convexity and semicontinuity of fuzzy mappings, Comput. Math. Appl., 51 (2006) 1809–1816] is redefined by using the concept of parameterized triples of fuzzy numbers. On the basis of the linear ordering of fuzzy numbers proposed by Goetschel and Voxman [R. Goetschel, W. Voxman, Elementar...

Journal: :Fuzzy Sets and Systems 2003
Francisco Chiclana Francisco Herrera Enrique Herrera-Viedma Luis Martínez-López

In (Fuzzy Sets and Systems 97 (1998) 33), we presented a fuzzy multipurpose decision making model integrating di4erent preference representations based on additive reciprocal fuzzy preference relations. The main aim of this paper is to complete the decision model studying conditions under which reciprocity property is maintained when aggregating preference relations using an OWA operator guided...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید