Showing 6,221 - 6,240 results of 19,871 for search '"*** (novel)"', query time: 0.08s Refine Results
  1. 6221

    Saturation cryptanalysis of CLEFIA by WANG Wei1, WANG Xiao-yun2

    Published 2008-01-01
    “…The saturation attack on a novel block cipher CLEFIA,which was proposed in FSE 2007,was reevaluated.The flaws in Shirai et al’s 8 round distinguishers were pointed out and corrected.In order to reduce the number of guessed subkeys,the attack utilized the movement of the whitening key to combine it with subkey,and explored a di-vide-and-conquer strategy.The partial sum technique was adopted to reduce the time complexity.As a result,the satura-tion attack can be extended from 10 round variant without key whitenings to 11 round CLEFIA-128/192/256,and is ap-plicable to 12 round CLEFIA-192/256 and 13 round CLEFIA-256.…”
    Get full text
    Article
  2. 6222

    Pobreza por subtração: A festa, de Ivan Ângelo by Frans Weiser

    Published 2013-01-01
    “…Ângelo excludes the voice of the poor from the novel, yet he does so precisely in order to call attention to the problematic manner in which literature, journalism, and bureaucratic reports claim to repre- sent the disenfranchised.…”
    Get full text
    Article
  3. 6223

    CAC scheme with imperfect power control in broadband CDMA networks by GAO Yong-hui1, ZHANG Dan-dan2

    Published 2009-01-01
    “…Putting forward the CAC schemes with imperfect power control for multimedia traffic would be great signifi-cant.The system capacity with imperfect power control and the other-cell to intra-cell interference factor was analyzed.And then considering the voice/video/data multimedia traffic scenario,a novel QoS(quality of service) based on CAC scheme was proposed.The simulation results show that the system capacity is heavily affected by the imperfect power control,and the proposed scheme can guarantee the QoS for different traffic efficiently,and improves the resource utility significantly.…”
    Get full text
    Article
  4. 6224

    Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG

    Published 2017-12-01
    “…Migrating traditional access control,such as mandatory and discretionary access control,into role-based access control(RBAC)lightens a practical way to improve the user-permission management efficiency.To guarantee the security of RBAC system,it is important to generate proper roles during the migration.However,abnormal user-permission configurations lead to wrong roles and cause tremendous security risks.To hunt the potential abnormal user-permission configurations,a novel spectral clustering based abnormal configuration hunting framework was proposed and recommendations were given to correct these configurations.Experimental results show its performance over existing solutions.…”
    Get full text
    Article
  5. 6225

    Mutual information power analysis attack of HMAC based on SM3 by Zhen WU, Min WANG, Jin-tao RAO, Zhi-bo DU, Sheng WANG, Ling-hao ZHANG

    Published 2016-10-01
    “…A novel method of mutual information power analysis attack was proposed.The method was built on the basis of the basic principle of power analysis and the basic theory of information.For the purpose of attacking the key,the mutual in-formation values was computed using two values between the mediate variable with the power traces.An experiment was im-plemented on the algorithm of HMAC based on SM3 using this method.The experimental results show the proposed attack method is effective because the initial value of state variable can be successfully retrieved to compute the real true key.…”
    Get full text
    Article
  6. 6226

    Roots Always Precede Routes: On the Road, through a Glass Darkly by Peggy PACINI

    Published 2011-03-01
    “…This article explores the subterranean layers of On the Road, firstly, approaching them from three perspectives (the dyad routes-roots, ethnogenesis and cultural geography), and secondly, considering the novel within a larger project, the “Road” project, which allows further insight into the genesis of the 1957 edition and of the original scroll published fifty years later. …”
    Get full text
    Article
  7. 6227

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. …”
    Get full text
    Article
  8. 6228

    A prediction algorithm of telecom customer churn based on Bayesian network parameters learning under incomplete data by Yuxiang ZHAO, Guangyue LU, Hanglong WANG, Siwei LI

    Published 2018-01-01
    “…Aiming at prediction of telecom customer churn,a novel method was proposed to increase the prediction accuracy with the missing data based on the Bayesian network.This method used k-nearest neighbor algorithm to fill the missing data and adds two types of monotonic influence constraints into the process of learning Bayesian network parameter.Simulations and actual data analysis demonstrate that the proposed algorithm obtains higher prediction accuracy of churn customers with the loss of less cost prediction accuracy of loyal customers,outperforms the classic expectation maximization algorithm.…”
    Get full text
    Article
  9. 6229

    Network slicing architecture based on SDN and NFV by Qi AN, Yanping LIU, Qian SUN, Lin TIAN

    Published 2016-11-01
    “…The traditional network architecture has some problems such as closed rigid structure,highly restricted data forwarding performance,and low utilization rate of resources,which can't meet the diverse services' requirements.In order to solve these problems,the concept of network slice was introduced.A novel network architecture for future mobile communication was proposed,which is based on network function virtualization(NFV)and software defined networking(SDN).This new network architecture can provide personalized network services to users based on third-party needs,share and isolate of network resources,the cost of a large number of operators was saved in terms of infrastructure.…”
    Get full text
    Article
  10. 6230

    Some Aspects of Extended General Variational Inequalities by Muhammad Aslam Noor

    Published 2012-01-01
    “…We expect that this paper may stimulate future research in this field along with novel applications.…”
    Get full text
    Article
  11. 6231

    Research on a very energy-efficient and low-delay flooding algorithm for wireless sensor network by LI Fang-min1, LIU Xin-hua1, KUANG Hai-lan2

    Published 2007-01-01
    “…A novel flooding algorithm called priority covering algorithm was proposed for wireless sensor network.In the algorithm,a method of priority covering was used for assigning different forwarding priorities to vicinity nodes so as to make the flooding packet cover the whole network rapidly;a scheme of restrained forwarding and a scheme of dynamic delay for forwarding were used for restraining the redundant flooding packets and reducing the conflicting retransmission overhead.The result of simulation shows that the algorithm is more energy-efficient and low-delay than those similar flooding algorithms proposed.…”
    Get full text
    Article
  12. 6232

    Advances in the clinical application of machine learning in acute pancreatitis: a review by Zhaowang Tan, Gaoxiang Li, Yueliang Zheng, Qian Li, Wenwei Cai, Jianfeng Tu, Senjun Jin

    Published 2025-01-01
    “…Traditional disease prediction models and scoring systems for acute pancreatitis (AP) are often inadequate in providing concise, reliable, and effective predictions regarding disease progression and prognosis. As a novel interdisciplinary field within artificial intelligence (AI), machine learning (ML) is increasingly being applied to various aspects of AP, including severity assessment, complications, recurrence rates, organ dysfunction, and the timing of surgical intervention. …”
    Get full text
    Article
  13. 6233

    An Alternative Method for the Gamma Function derived from Natural Logarithm and Pi Function by Chinnaraji Annamalai, Antonio Marcos de Oliveira Siqueira

    Published 2023-06-01
    “…For them, this paper presents the derivation of gamma function from the natural logarithm and Euler’s factorial function. Also, a novel factorial theorem, which is alternative to the gamma function, is introduced in this article and it computes the accurate values of factorial for positive real numbers.     …”
    Get full text
    Article
  14. 6234

    Design and Implementation of DHT Algorithm for NDN by Kai Lei, Meng Yuan

    Published 2014-12-01
    “…A novel distributed Hash table(DHT)algorithm under named data networking(NDN), which was called ndnDHT, was proposed. …”
    Get full text
    Article
  15. 6235

    Hole recovery algorithm based on mobile inner nodes in wireless sensor networks by Kai YANG, Quan LIU, Shu-kui ZHANG, Jin LI, Dong-liang WENG

    Published 2012-09-01
    “…To solve the problem of coverage holes in target areas,a principle for hole recovery was proposed.Based on the principle,a novel algorithm named SOI was proposed for hole recovery using mobile nodes,which does not require location information,figures out the optimal inner nodes in the edge of coverage holes,and then moves them to new po-sitions.Through this mechanism,the area of coverage holes could be reduced.Analysis and simulation results show that,SOI has a better performance in dense deployed wireless sensor networks compared with existing VHR algorithm.…”
    Get full text
    Article
  16. 6236

    A New Approach for Analyzing the Reliability of the Repair Facility in a Series System with Vacations by Renbin Liu, Yong Wu

    Published 2012-01-01
    “…The method proposed in this work is novel and concise, which can make us see clearly the structures of the facility indices of a series system with an unreliable repair facility, two convolution relations. …”
    Get full text
    Article
  17. 6237

    Alexandre de Humboldt et Aimé Bonpland, botanistes de l’Amérique hispanique (1799-1804) : de la taxonomie à l’épistémologie by Michèle Guicharnaud-Tollis

    Published 2018-06-01
    “…Well beyond, this reinforced intuitions previously only glimpsed: the making of herbariums led to theories about plants’ geography (1805) and novel epystemological reflections about their « metamorphosis » and integration inside a living and evolving Cosmos.…”
    Get full text
    Article
  18. 6238

    New remote authorization protocol for vehicle diagnosis by Zheng-da JIAO, Jian-feng MA, Cong SUN, Qing-song YAO

    Published 2014-11-01
    “…The authorization of diagnosis principals is a critical problem in the remote fault diagnosis of vehicles.Considering the defects of the previous authorization protocol for the remote diagnosis,i.e.PVAUDS,a novel authorization protocol is proposed,named PVAUDS+.In addition to the enforcement on the security properties of PVAUDS,the bidirectional authentication and the freshness of authorization tickets for the diagnosis principals are provided.The resistance of Denial-of-Service (DoS) attack for the trusted third party is also provided.The proposed security targets are achieved through the cost increasing of requests for the resistance of DoS attack,the automatic proof of security properties with the ProVerif tool.The results of quantitative analysis show proposed protocol is practical for use.…”
    Get full text
    Article
  19. 6239

    Toward location privacy protection in Spatial crowdsourcing by Hang Ye, Kai Han, Chaoting Xu, Jingxin Xu, Fei Gui

    Published 2019-03-01
    “…In this article, we propose a novel framework that can protect the location privacy of the workers and the requesters when assigning tasks to workers. …”
    Get full text
    Article
  20. 6240

    Addressing gaps in the diagnosis of TB in children by J. Hoffmann, C.R. Horsburgh Jr

    Published 2024-10-01
    “…International collaborations are also central to integrating novel diagnostics and providing support for these vulnerable populations.…”
    Get full text
    Article