نتایج جستجو برای: signature matrices

تعداد نتایج: 140686  

2001
Spyridoula M. Armeni Dimitris Christodoulakis Ioannis Kostopoulos Polychronis D. Kountrias Yannis C. Stamatiou Michalis Nik Xenos

This paper presents an information hiding method that can be used for proving copyright ownership of a digital object. In contrast with other methods, the identity of the owner of the object is proved by the owner’s ability to demonstrate knowledge of a certain property of the signature. The method utilizes Zero Knowledge Interactive Proof (ZKIP) protocols for computationally intractable, or NP...

Journal: :bulletin of the iranian mathematical society 2015
b. r. yahaghi m. rahimi-alangi

let $ m , n in mathbb{n}$, $d$ be a division ring, and $m_{m times n}(d)$ denote the bimodule of all $m times n$ matrices with entries from $d$. first, we characterize one-sided submodules of $m_{m times n}(d)$ in terms of left row reduced echelon or right column reduced echelon matrices with entries from $d$. next, we introduce the notion of a nest module of matrices with entries from $d$. we ...

Journal: :Neuropsychology, development, and cognition. Section B, Aging, neuropsychology and cognition 2010
Mark C Fox Neil Charness

Few studies have examined the impact of age on reactivity to concurrent think-aloud (TA) verbal reports. An initial study with 30 younger and 31 older adults revealed that thinking aloud improves older adult performance on a short form of the Raven's Matrices (Bors & Stokes, 1998, Educational and Psychological Measurement, 58, p. 382) but did not affect other tasks. In the replication experimen...

Journal: :CoRR 2010
Romain Couillet Jakob Hoydis Mérouane Debbah

In this work, a general wireless channel model for different types of code-division multiple access (CDMA) and space-division multiple-access (SDMA) systems with isometric random signature or precoding matrices over frequency-selective and flat fading channels is considered. For such models, deterministic approximations of the mutual information and the signal-to-interference-plus-noise ratio (...

Journal: :Kybernetika 2009
Zhenning Zhang Huafei Sun Fengwei Zhong

Institute of Mathematics of the Academy of Sciences of the Czech Republic provides access to digitized documents strictly for personal use. Each copy of any part of this document must contain these Terms of use. This paper has been digitized, optimized for electronic delivery and stamped with digital signature within the project DML-CZ: The Czech Digital Mathematics Library In this paper, we in...

Journal: :international journal of environmental research 0

land cover change constitutes one of main way of alteration of soil organic matter in both quantitative and qualitative terms. the goal of this study was to compare the carbon stock and the isotopic signature of the organic matter in the soil of areas with different land use, covered with forest and grass (pasture). the study area is located at sorocaba, sp, brazil. using un-deformed soil sampl...

Let $ m , n in mathbb{N}$, $D$ be a division ring, and $M_{m times n}(D)$ denote the bimodule of all $m times n$ matrices with entries from $D$. First, we characterize one-sided submodules of $M_{m times n}(D)$ in terms of left row reduced echelon or right column reduced echelon matrices with entries from $D$. Next, we introduce the notion of a nest module of matrices with entries from $D$. We ...

Journal: :Energies 2023

Among the most widespread systems in industrial plants are automated drive systems, key and common element of which is induction motor. In view challenging operating conditions equipment, task fault detection based on analysis electrical parameters relevant. The authors propose identification patterns characterizing occurrence development bearing defect by singular method as applied to stator c...

Journal: :amirkabir international journal of modeling, identification, simulation & control 2014
f. naji mohades m. h. yaghmaee moghadam

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...

راشدنیا, زهرا, صالحی‌کاخکی, احمد,

Stucco mihrabs are among valuable elements of Iranian architecture both in view of technique and of composition of patterns and inscriptions. They were crafted over a long period and are considered a valuable collection of designs and motifs either invented or inherited from past eras. The climax of the craft is considered to be during the Seljuq and early Timurid period, but dating remaining [...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید