Suggested Topics within your search.
Suggested Topics within your search.
- novel 11
- History 4
- Appreciation 3
- History and criticism 3
- kiswahili novel 3
- Experimental fiction 2
- FICTION / Literary 2
- Novel 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- African fiction 1
- African literature 1
- American 1
- American Literature 1
- American literature 1
- Anesthesia 1
- Anesthesiology 1
- Authors, Nigerian 1
- Beauty operators 1
- Bed and breakfast accommodations 1
- Blue collar workers 1
- Brothers 1
- Brothers and sisters 1
- Celebrities 1
- Chemical weapons 1
- Coming of Age 1
- Courtship 1
- Criticism and interpretation 1
- Elias (Fictitious character) 1
-
6221
Saturation cryptanalysis of CLEFIA
Published 2008-01-01“…The saturation attack on a novel block cipher CLEFIA,which was proposed in FSE 2007,was reevaluated.The flaws in Shirai et al’s 8 round distinguishers were pointed out and corrected.In order to reduce the number of guessed subkeys,the attack utilized the movement of the whitening key to combine it with subkey,and explored a di-vide-and-conquer strategy.The partial sum technique was adopted to reduce the time complexity.As a result,the satura-tion attack can be extended from 10 round variant without key whitenings to 11 round CLEFIA-128/192/256,and is ap-plicable to 12 round CLEFIA-192/256 and 13 round CLEFIA-256.…”
Get full text
Article -
6222
Pobreza por subtração: A festa, de Ivan Ângelo
Published 2013-01-01“…Ângelo excludes the voice of the poor from the novel, yet he does so precisely in order to call attention to the problematic manner in which literature, journalism, and bureaucratic reports claim to repre- sent the disenfranchised.…”
Get full text
Article -
6223
CAC scheme with imperfect power control in broadband CDMA networks
Published 2009-01-01“…Putting forward the CAC schemes with imperfect power control for multimedia traffic would be great signifi-cant.The system capacity with imperfect power control and the other-cell to intra-cell interference factor was analyzed.And then considering the voice/video/data multimedia traffic scenario,a novel QoS(quality of service) based on CAC scheme was proposed.The simulation results show that the system capacity is heavily affected by the imperfect power control,and the proposed scheme can guarantee the QoS for different traffic efficiently,and improves the resource utility significantly.…”
Get full text
Article -
6224
Spectral-clustering-based abnormal permission assignments hunting framework
Published 2017-12-01“…Migrating traditional access control,such as mandatory and discretionary access control,into role-based access control(RBAC)lightens a practical way to improve the user-permission management efficiency.To guarantee the security of RBAC system,it is important to generate proper roles during the migration.However,abnormal user-permission configurations lead to wrong roles and cause tremendous security risks.To hunt the potential abnormal user-permission configurations,a novel spectral clustering based abnormal configuration hunting framework was proposed and recommendations were given to correct these configurations.Experimental results show its performance over existing solutions.…”
Get full text
Article -
6225
Mutual information power analysis attack of HMAC based on SM3
Published 2016-10-01“…A novel method of mutual information power analysis attack was proposed.The method was built on the basis of the basic principle of power analysis and the basic theory of information.For the purpose of attacking the key,the mutual in-formation values was computed using two values between the mediate variable with the power traces.An experiment was im-plemented on the algorithm of HMAC based on SM3 using this method.The experimental results show the proposed attack method is effective because the initial value of state variable can be successfully retrieved to compute the real true key.…”
Get full text
Article -
6226
Roots Always Precede Routes: On the Road, through a Glass Darkly
Published 2011-03-01“…This article explores the subterranean layers of On the Road, firstly, approaching them from three perspectives (the dyad routes-roots, ethnogenesis and cultural geography), and secondly, considering the novel within a larger project, the “Road” project, which allows further insight into the genesis of the 1957 edition and of the original scroll published fifty years later. …”
Get full text
Article -
6227
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. …”
Get full text
Article -
6228
A prediction algorithm of telecom customer churn based on Bayesian network parameters learning under incomplete data
Published 2018-01-01“…Aiming at prediction of telecom customer churn,a novel method was proposed to increase the prediction accuracy with the missing data based on the Bayesian network.This method used k-nearest neighbor algorithm to fill the missing data and adds two types of monotonic influence constraints into the process of learning Bayesian network parameter.Simulations and actual data analysis demonstrate that the proposed algorithm obtains higher prediction accuracy of churn customers with the loss of less cost prediction accuracy of loyal customers,outperforms the classic expectation maximization algorithm.…”
Get full text
Article -
6229
Network slicing architecture based on SDN and NFV
Published 2016-11-01“…The traditional network architecture has some problems such as closed rigid structure,highly restricted data forwarding performance,and low utilization rate of resources,which can't meet the diverse services' requirements.In order to solve these problems,the concept of network slice was introduced.A novel network architecture for future mobile communication was proposed,which is based on network function virtualization(NFV)and software defined networking(SDN).This new network architecture can provide personalized network services to users based on third-party needs,share and isolate of network resources,the cost of a large number of operators was saved in terms of infrastructure.…”
Get full text
Article -
6230
Some Aspects of Extended General Variational Inequalities
Published 2012-01-01“…We expect that this paper may stimulate future research in this field along with novel applications.…”
Get full text
Article -
6231
Research on a very energy-efficient and low-delay flooding algorithm for wireless sensor network
Published 2007-01-01“…A novel flooding algorithm called priority covering algorithm was proposed for wireless sensor network.In the algorithm,a method of priority covering was used for assigning different forwarding priorities to vicinity nodes so as to make the flooding packet cover the whole network rapidly;a scheme of restrained forwarding and a scheme of dynamic delay for forwarding were used for restraining the redundant flooding packets and reducing the conflicting retransmission overhead.The result of simulation shows that the algorithm is more energy-efficient and low-delay than those similar flooding algorithms proposed.…”
Get full text
Article -
6232
Advances in the clinical application of machine learning in acute pancreatitis: a review
Published 2025-01-01“…Traditional disease prediction models and scoring systems for acute pancreatitis (AP) are often inadequate in providing concise, reliable, and effective predictions regarding disease progression and prognosis. As a novel interdisciplinary field within artificial intelligence (AI), machine learning (ML) is increasingly being applied to various aspects of AP, including severity assessment, complications, recurrence rates, organ dysfunction, and the timing of surgical intervention. …”
Get full text
Article -
6233
An Alternative Method for the Gamma Function derived from Natural Logarithm and Pi Function
Published 2023-06-01“…For them, this paper presents the derivation of gamma function from the natural logarithm and Euler’s factorial function. Also, a novel factorial theorem, which is alternative to the gamma function, is introduced in this article and it computes the accurate values of factorial for positive real numbers. …”
Get full text
Article -
6234
Design and Implementation of DHT Algorithm for NDN
Published 2014-12-01“…A novel distributed Hash table(DHT)algorithm under named data networking(NDN), which was called ndnDHT, was proposed. …”
Get full text
Article -
6235
Hole recovery algorithm based on mobile inner nodes in wireless sensor networks
Published 2012-09-01“…To solve the problem of coverage holes in target areas,a principle for hole recovery was proposed.Based on the principle,a novel algorithm named SOI was proposed for hole recovery using mobile nodes,which does not require location information,figures out the optimal inner nodes in the edge of coverage holes,and then moves them to new po-sitions.Through this mechanism,the area of coverage holes could be reduced.Analysis and simulation results show that,SOI has a better performance in dense deployed wireless sensor networks compared with existing VHR algorithm.…”
Get full text
Article -
6236
A New Approach for Analyzing the Reliability of the Repair Facility in a Series System with Vacations
Published 2012-01-01“…The method proposed in this work is novel and concise, which can make us see clearly the structures of the facility indices of a series system with an unreliable repair facility, two convolution relations. …”
Get full text
Article -
6237
Alexandre de Humboldt et Aimé Bonpland, botanistes de l’Amérique hispanique (1799-1804) : de la taxonomie à l’épistémologie
Published 2018-06-01“…Well beyond, this reinforced intuitions previously only glimpsed: the making of herbariums led to theories about plants’ geography (1805) and novel epystemological reflections about their « metamorphosis » and integration inside a living and evolving Cosmos.…”
Get full text
Article -
6238
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01“…The authorization of diagnosis principals is a critical problem in the remote fault diagnosis of vehicles.Considering the defects of the previous authorization protocol for the remote diagnosis,i.e.PVAUDS,a novel authorization protocol is proposed,named PVAUDS+.In addition to the enforcement on the security properties of PVAUDS,the bidirectional authentication and the freshness of authorization tickets for the diagnosis principals are provided.The resistance of Denial-of-Service (DoS) attack for the trusted third party is also provided.The proposed security targets are achieved through the cost increasing of requests for the resistance of DoS attack,the automatic proof of security properties with the ProVerif tool.The results of quantitative analysis show proposed protocol is practical for use.…”
Get full text
Article -
6239
Toward location privacy protection in Spatial crowdsourcing
Published 2019-03-01“…In this article, we propose a novel framework that can protect the location privacy of the workers and the requesters when assigning tasks to workers. …”
Get full text
Article -
6240
Addressing gaps in the diagnosis of TB in children
Published 2024-10-01“…International collaborations are also central to integrating novel diagnostics and providing support for these vulnerable populations.…”
Get full text
Article