Showing 6,921 - 6,940 results of 21,030 for search '"multiplication"', query time: 0.09s Refine Results
  1. 6921

    Supporting Preemptive Multitasking in Wireless Sensor Networks by Emanuele Lattanzi, Valerio Freschi, Alessandro Bogliolo

    Published 2014-02-01
    “…Supporting the concurrent execution of multiple tasks on lightweight sensor nodes could enable the deployment of independent applications on a shared wireless sensor network, thus saving cost and time by exploiting infrastructures which are typically underutilized if dedicated to a single task. …”
    Get full text
    Article
  2. 6922

    A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features by Xun LI, Lin YOU, Jiahao LIANG, Chunhui YAN

    Published 2018-10-01
    “…Aiming at the problem that the biometric feature-based fuzzy vault is vulnerable to correlation attack and the loss of key and biometric template,and the authentication performance of fuzzy vault based on single biometric feature is unreliable,a novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features was proposed.This scheme carried out irreversible transformation of fingerprint features and face features,and based on the Diffie-Hellman algorithm,the transformed fingerprints and face features were fused into a template at the feature level.Finally,the fusion template was used to construct the fuzzy vault.By updating the random matrix,the vault could be revoked,which could effectively resist the correlation attacks and achieve reliable authentication.Experimental results show that the proposed scheme improves the reliability of the system and the security of multiple biometric templates.…”
    Get full text
    Article
  3. 6923

    Pratiquer une réflexion épistémologique sur les sciences dans une école communautaire du Québec : exemple de tension entre savoirs diffusés et savoirs locaux.  by Hervé Ferrière, Laurence Ferrière

    Published 2015-09-01
    “…We think generally, in most of the western countries, that the pupils and the teachers know difficulties during the teaching of the experimental sciences. Multiple causes, often vague, are advanced to explain them. …”
    Get full text
    Article
  4. 6924

    A estética contemporânea: nova poética, novo olhar by Cid Ottoni Bylaardt

    Published 2012-01-01
    “…The so-called Post-Modernism in Brazil, as in most western countries, is a multiple phenomenon, full of indetermination. One aspect of this panorama is the distrust of speech structures once considered stables that seemed to characterize the modernist language, and also the consciense of the precarious status of the groundworks and determinations, which is disseminated in the idea of scattering, of insuficiency of the dialectics supported by enlightenment and rationalism. …”
    Get full text
    Article
  5. 6925

    Situational Fluidity and the Use of Identity Labels in Interactions by Andy Holmes, Amin Ghaziani

    Published 2025-01-01
    “…On the basis of 52 interviews, the authors show that LGBTQ+ people adopt multiple terms and adjust their usage relative to the interactional demands at hand. …”
    Get full text
    Article
  6. 6926

    An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks by Pengfei Shao, Yanwei Zhao, Yaohui Wu, Xinwei Yao

    Published 2015-04-01
    “…A novel opportunistic-network-coding-based retransmission approach was proposed.According to the feedback on packet loss from the receiving nodes,this novel approach can not only efficiently select a combination of lost packets through Hash lookup for packet retransmission,but also can ensure priority retransmission making up to a single combination retransmission packet which can maximize the number of receiving nodes for recovering their lost packets.Furthermore,the proposed approach fully exploits the coding opportunity based on neighborhood association,and allows the receiving nodes to recover their lost packets from multiple retransmission packets.The simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms.…”
    Get full text
    Article
  7. 6927

    AONT-and-NTRU-based rekeying scheme for encrypted deduplication by Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI

    Published 2021-10-01
    “…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
    Get full text
    Article
  8. 6928

    A density clustering-based network performance failure big data analysis algorithm by Xiang LI, Yuan LI, Zifei ZHANG, Zhe YANG

    Published 2020-09-01
    “…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
    Get full text
    Article
  9. 6929

    Jesus talks to the Samaritan woman by P. Rule

    Published 2024-12-01
    “… The contemporary world is characterised by the dehumanisation of “the other” on multiple grounds. Jesus’ encounter with the Samaritan woman (John 4:1-42) sheds light on his attitude towards, and his engagement with her as a conventional “other” for Jews. …”
    Get full text
    Article
  10. 6930

    Dynamic P2P trust model based on context factors by Yi-chun LIU, Ying-hong LIANG

    Published 2016-08-01
    “…A multi-dimensional trust model was constructed based on the context factors.The direct trust of the interac-tive entities was estimated by integrating the time-decay factor,the transaction impact factor and the participation fre-quency.The trust similarity algorithm was designed based on the Dice similarity and the feedback credibility was aggre-gated from multiple trust chains.The direct interaction,the evaluation similarity and the trust chain was integrated for calculating the recommendation trust.The peer's trust was evaluated by combing the direct trust and the recommendation trust.A new mechanisam was proposed for the trust's update,incentive or punishment according to the peer's behavior on the interaction.The practical example analysis shows that the proposed model can effectively explain the effect of the transaction contextual factors on the entity trust,and can improve the trust sensitivity to the context transaction factors.…”
    Get full text
    Article
  11. 6931

    Variation in mitochondrial genome primary sequence among whole-genome-sequenced strains of Neurospora crassa by K. McCluskey

    Published 2012-06-01
    “…Despite the fact that the mitochondrial genome is present in multiple copies per cell, many of the polymorphisms were homozygous within each strain. …”
    Get full text
    Article
  12. 6932

    In the Clouds: On the Vagueness of Atmospheres by Andreas Rauh

    Published 2017-02-01
    “…In the course of listing the multiple characteristics of atmosphere, problems that have to do with language emerge. …”
    Get full text
    Article
  13. 6933

    Mémoire et minorité : l’identité collective dans la littérature germanophone de Belgique by Arvi Sepp

    Published 2016-12-01
    “…Through a close reading of selected literary texts from German-speaking minority authors in East Belgium, this contribution will discuss the status of the literary representation of minority culture and its expression of multiple identities and allegiances as a space (be it geographic, cultural, linguistic, or aesthetic) in which global and local forces interact. …”
    Get full text
    Article
  14. 6934

    Les miroirs médiévaux : réflexions génériques et genrées by Clémentine Girault, Jeanne Mousnier-Lompré

    Published 2024-12-01
    “…While these texts aim to « engender » subjects through their prescriptive writing, the medieval educational treatises, both in the body of the text and in their materiality, present multiple facets that go beyond the gendered distribution of the initial address. …”
    Get full text
    Article
  15. 6935

    Research of smart power station framework and practice of informatization construction by Xizhao WANG, Shengjun LIU, Dejun WANG, Ning HE

    Published 2016-04-01
    “…Following this blueprint,program management approach was innovated,the problem that the implementation workis multiple,complex and strongly relevant was solved,initial results in six areas was achieved,the overall operation level of power plant was improved,and experience for the development of smart power industry in China was accumulated.…”
    Get full text
    Article
  16. 6936

    Les mosquées ibadites du Maghreb by Virginie Prevost

    Published 2009-07-01
    “…The Ibadite mosques of Mzab, Jebel Nafûsa and Djerba share a number of characteristics, the most important being the multiplicity of mihrabs and prayer niches outside of the sanctuary. …”
    Get full text
    Article
  17. 6937

    Ossifying Fibroma of Mandible - A Case Report by Gargi Jadaun, A. Bhagwandas Rai, Saeeda Kharodia, Viral Gadhiya

    Published 2023-10-01
    “…Findings: Clinical manifestations include asymptomatic expansion of the mandible with infrequent maxillary lesions, pain, malocclusion, and compromised quality of life including aesthetic perception. Owing to multiplicity of features, tendency of recurrence, and possibility of malignant transformation, the diagnosis, treatment, and post-operative management of ossifying fibroma are always a challenge. …”
    Get full text
    Article
  18. 6938

    Parry–Romberg Syndrome with Uhthoff’s Phenomena: A Spectrum of Autoimmune Disease? by Samuel Asanad

    Published 2019-01-01
    “…The present case suggests that PRS may possibly have an autoimmune etiology resembling that of multiple sclerosis.…”
    Get full text
    Article
  19. 6939

    Acer palmatum 'Bloodgood' by Edward F. Gilman

    Published 2004-10-01
    “…Leaves turn greenish red during hot weather in the southern part of its range. The multiple trunks are muscular-looking, picturesque, grey and show nicely when lighted at night. …”
    Get full text
    Article
  20. 6940

    State recovery attack on ACORN v3 in nonce-reuse setting by Guoshuang ZHANG, Xiao CHEN, Dongdai LIN, Fengmei LIU

    Published 2020-08-01
    “…Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2<sup>122.5</sup>c,where c was the time complexity of solving linear equations.The data complexity and the storage complexity were negligible.Furthermore,according to the analysis on the sense of multiple nonce reuse,it is found that relatively complicated filter function of ACORN v3 makes it infeasible to extract the linear equations about the internal state directly from key streams.Thus,the risk of significantly reducing the attack complexity by increasing the times of nonce reuse can be effectively avoided.…”
    Get full text
    Article