نتایج جستجو برای: T-table implementation

تعداد نتایج: 1151118  

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

2017

The Research Aim is to design the implementation model of maternal and child health policy in East Nusa Tenggara, Indonesia. The Research Method is an Analytic Observational with cross sectional design. The total sample of the research is 235 with the technical research of Multistage random sampling by clusters on the islands of Flores, Sumba, Timor (including Sabu and Rote), and the District o...

2006
Kevin Wilkinson

A common approach to providing persistent storage for RDF is to store statements in a three-column table in a relational database system. This is commonly referred to as a triple store. Each table row represents one RDF statement. For RDF graphs with frequent patterns, an alternative storage scheme is a property table. A property table comprises one column containing a statement subject plus on...

2009
Elena Shmileva

Let Xα be a symmetric α-stable Lévy process with α ∈ (1, 2). We consider small ball probabilities of the following type P {‖Xα − λ f‖ < r} as r → 0, and λr → 0 or λr = c , c > 0, where ‖ · ‖ is the sup-norm and f ∈ C[0, 1] that starts at 0. We obtain the exact rate of decrease for these probabilities including constants. Using these small ball estimates, we obtain a functional LIL for Xα with a...

Introduction: Blended learning is a combination of systemic and contingency approaches to learning which means that besides paying attention to the relationships between all components as a whole, the conditions of utilizing these tools to achieve the best results are especially taken into account too. The aim of this study was to explore the perspectives of Sarab health and treatment network s...

Journal: :Technium 2022

The security of the transmitted data is one important issues that led to improve cryptosystems. Block ciphers as symmetric key cryptosystems are widely implemented in different applications and devices. Many algorithms had been presented proposed new designs enhancements for block ciphers. Most these papers based on differential characteristics provided by Differential Distribution table DDT. i...

Journal: :BABASAL English Education Journal 2021

The objective this research is to look for the improvement of students’ vocabulary mastery through extensive reading at SMP Muhammadiyah Luwuk. This used a pre-experimental design with one group pretest and posttest design. population was students ninth grade Luwuk consisted twenty-two students. sample all research. In collecting data, researcher test. test posttest. Data were analyzed statisti...

Journal: :Phinisi Integration Review 2023

This research is quantitative descriptive. The population as well the sample in this study were 30 people who worked fried traders at Losari Beach, Makassar City. implementation of aims to determine how much capital and labor wages have on income food Processing data variables using multiple regression analysis.The results showed that F-table was 2.96 while F-count 344, 962 probability value 0....

قلعه‌ای , علیرضا, حمزه رباطی, مطهره , مهاجرانی, بهناز ,

   Background & Aims: E-learning is one of the phenomena of modern world that has developed in the information age and the knowledge-based society. The aim of this study was to evaluate the attitudes of Urmia University of Medical Sciences faculties towards the implementation of the e-learning system. Materials & Methods : The research is a non-experimental descriptive survey. The statistical p...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1390

acknowledgements i wish to express my gratitude to all those who have helped me in preparing this thesis. i would like to express my deep gratitude to my respected advisor dr. kourosh akef, whose advice and comments helped me in the early stages of the research and throughout the writing process. i would also like to express my gratitude to dr. hajar khanmohammad whose invaluable guidance he...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید