Showing 1,581 - 1,600 results of 238,842 for search '"5"', query time: 0.35s Refine Results
  1. 1581

    Revisit two memoryless state‐recovery cryptanalysis methods on A5/1 by Yanbin Xu, Yonglin Hao, Mingxing Wang

    Published 2023-07-01
    “…Abstract At ASIACRYPT 2019, Zhang proposed a near collision attack on A5/1 claiming to recover the 64‐bit A5/1 state with a time complexity around 232 cipher ticks with negligible memory requirements. …”
    Get full text
    Article
  2. 1582
  3. 1583

    Exact Null Controllability of KdV-Burgers Equation with Memory Effect Systems by Rajagounder Ravi Kumar, Kil To Chong, Jong Ho Park

    Published 2012-01-01
    “…This paper is concerned with exact null controllability analysis of nonlinear KdV-Burgers equation with memory. The proposed approach relies upon regression tool to prove controllability property of linearized KdV-Burgers equation via Carleman estimates. …”
    Get full text
    Article
  4. 1584
  5. 1585

    Revija Les/Wood izhaja pod okriljem Založbe Univerze v Ljubljani by Matevž Rudolf

    Published 2022-10-01
    “… Univerza v Ljubljani je s 40.000 študentkami in študenti največja in najstarejša univerza v Sloveniji. …”
    Get full text
    Article
  6. 1586

    Latency model of neighbor discovery based on Bluetooth low energy 5.0 by Bingqing LUO, Peipei WANG, Zhengkang WANG, Zhixin SUN

    Published 2021-06-01
    “…For Bluetooth low energy neighbor discovery protocol, it was usually difficult to assess the discovery latency performance.A latency performance model of neighbor discovery based on Chinese remainder theorem for Bluetooth 5.0 standard was proposed.A mathematical relationship between the discovery latency and key parameters was put forward, including advertising interval, scan interval and scan window.The effect of different parameter configurations on the neighbor discovery latency was verified.Experimental results show that the model can effectively predict the delay peak under the influence of parameter configuration, and provide parameter configuration verification and guidance for different application scenarios.…”
    Get full text
    Article
  7. 1587

    Critical functions for STAT5 tetramers in the maturation and survival of natural killer cells by Jian-Xin Lin, Ning Du, Peng Li, Majid Kazemian, Tesfay Gebregiorgis, Rosanne Spolski, Warren J. Leonard

    Published 2017-11-01
    “…We previously found that NK cell numbers are decreased in Stat5a−Stat5b tetramer-deficient double knockin (DKI) mice, but the mechanism was not investigated. …”
    Get full text
    Article
  8. 1588

    Transient Study on the HTR-PM with TINTE-vPower Coupling Code Package by Jun Sun, Ximing Sun, Yanhua Zheng

    Published 2020-01-01
    “…In this paper, a coupling code package was developed with the TINTE and vPower codes to understand how the HTR-PM operated. …”
    Get full text
    Article
  9. 1589
  10. 1590
  11. 1591
  12. 1592

    Motivacija in zadovoljstvo z življenjem pri zaposlenih v javnem in zasebnem sektorju by Julija Peklar, Eva Boštjančič

    Published 2012-10-01
    “…Delovna motivacija je usmerjanje človekove aktivnosti k želenim ciljem, s pomočjo njegovih motivov, nastalih v človekovi notranjosti ali v njegovem okolju, na podlagi njegovih potreb. …”
    Get full text
    Article
  13. 1593
  14. 1594

    Rheumatoid arthritis disease activity index-5: Utility in busy clinical settings by Harpreet Singh, Vikram Singh Tanwar, Gagandeep Sukhija, Rekha Mathur, Parminder Kaur

    Published 2017-01-01
    “…Objective: To assess disease activity using Rheumatoid Arthritis Disease Activity Index-5 (RADAI-5) in patients with rheumatoid arthritis (RA) and its correlation with Disease Activity Score using 28 joint count (DAS28) and Clinical Disease Activity Index (CDAI). …”
    Get full text
    Article
  15. 1595
  16. 1596

    5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix by Geeta Biban, Renu Chugh, Anju Panwar, Mohammad Sajid

    Published 2024-01-01
    “…This article proposed an image encryption scheme along a novel five-dimensional hyperchaotic system and a Fibonacci Q-matrix (FQ-matrix) for gray images. …”
    Get full text
    Article
  17. 1597
  18. 1598
  19. 1599
  20. 1600

    Hierarchical proxy consensus optimization for IoV based on blockchain and trust value by Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU

    Published 2022-06-01
    “…With the rapid development of Internet of vehicles, 5G and artificial intelligence technologies, intelligent transportation has become the development trend of transportation technology.As a vehicle-vehicle and vehicle-road information interaction platform, the Internet of vehicles is the basic support platform for intelligent traffic information sharing and processing.At the same time, the security of Internet of vehicles has attracted much attention, especially data security which may cause user privacy leakage.The blockchain technology has become a solution, but it still faces new challenges in efficiency, security and other aspects.With the increase of vehicle nodes and information, how to efficiently achieve information consensus in high-speed vehicle moving environment has become a key problem.Then a bottom-up RSU (road side unit) chain consensus protocol was proposed based on blockchain and trust value.Several typical consensus structures were compared, and bottom-up two-layer consensus structure was adopted according to the actual scenarios of the Internet of vehicles.Moreover, a group leader node election algorithm was proposed which is based on node participation, work completion and message value.The system security was ensured by assigning trust value to each vehicle.Following the consensus structure and algorithm work mentioned above, the specific process of the protocol was comprehensively described, which was divided into six steps: region division, group leader node selection, local consensus, leader primary node selection, global consensus, and intra-domain broadcast.Then the experiments were analyzed from four aspects: security, communication complexity, consensus algorithm delay and fault tolerance rate.Experiments showed that, compared with other schemes, the proposed protocol can effectively reduce communication complexity and shorten consensus delay under the condition of resisting conspiracy attack, witch attack and other attacks.On the premise of security, the protocol improves fault tolerance rate and enables more nodes to participate in information sharing to satisfy the requirements of Internet of vehicles scenarios.…”
    Get full text
    Article