• Nenhum resultado encontrado

[PDF] Top 20 Design of An Efficient Neural Key Generation

Has 10000 "Design of An Efficient Neural Key Generation" found on our website. Below are the top 20 most common "Design of An Efficient Neural Key Generation".

Design of An Efficient Neural Key Generation

Design of An Efficient Neural Key Generation

... goal of any cryptographic system is the exchange of information among the intended users without any leakage of information to others who may have unauthorized access to ...secret key could be ... See full document

10

Application of Artificial Neural Networks for Predicting Generated Wind Power

Application of Artificial Neural Networks for Predicting Generated Wind Power

... area of wind turbine in m 3 , and V is up stream wind speed in meter per second, The turbine power output influences on the wind capacity because power is cubic proportional to wind speed in ...seasons of a ... See full document

4

Efficient Hardware Design and Implementation of AES Cryptosystem

Efficient Hardware Design and Implementation of AES Cryptosystem

... types of cryptographic systems are used: Symmetric and Asymmetric ...uses an identical key for the sender and receiver; both to encrypt the message text and decrypt the cipher ...amount of ... See full document

7

An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment

An Efficient Certificate-Free Key Distribution Protocol for Secure Group Communication in Grid Environment

... is an important mechanism to realize large-scale information resource ...one of the important issues in secure group ...plays an important role that allows secure group communication among members in ... See full document

7

Affinity improvement of a therapeutic antibody by structure-based computational design: generation of electrostatic interactions in the transition state stabilizes the antibody-antigen complex.

Affinity improvement of a therapeutic antibody by structure-based computational design: generation of electrostatic interactions in the transition state stabilizes the antibody-antigen complex.

... optimization of antibodies is a desirable goal towards the development of better therapeutic ...library of mutations of 11K2 to identify antibody variants of potentially higher ... See full document

9

An Efficient Watermarking Scheme for Medical Data Security With the Aid of Neural Network

An Efficient Watermarking Scheme for Medical Data Security With the Aid of Neural Network

... usage of the ...be an efficient method for providing the data ...to design an efficient watermarking technique to provide data security with the aid of neural ... See full document

12

Generation of Lyapunov Functions by Neural Networks

Generation of Lyapunov Functions by Neural Networks

... set of basis elements are capable of uniform approximation of continuous functions over a compact region D ⊆ X ...function of an asymptotically stable ...classes of function ... See full document

5

An Efficient Supervised Training Algorithm for Multilayer Spiking Neural Networks.

An Efficient Supervised Training Algorithm for Multilayer Spiking Neural Networks.

... spiking neural networks (SNNs) are the third generation of neural networks and perform remarkably well in cognitive tasks such as pattern ...tion of the hierarchical structure and ... See full document

29

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

... and efficient multivariate public key cryptosystems continues to be a challenging area of research in recent ...version of Little Dragon cryptosystem. Like Dragon cryptosystems the public ... See full document

10

Efficient Design of Reversible Multiplexers with Low Quantum  Cost

Efficient Design of Reversible Multiplexers with Low Quantum Cost

... in an invertible manner that marks a promising new ...heat generation is a serious problem for today‟s computer ...behavior of transistors and some other materials becomes primary cause for the power ... See full document

4

An Efficient Architecture in Next Generation Wireless Networks

An Efficient Architecture in Next Generation Wireless Networks

... deployment of next-generation (NG) wireless systems, ...to an enormous increase in both the number of mobile subscribers and mobile ...features of NG wireless systems can be highlighted ... See full document

7

 EFFICIENT OFFICIAL STATISTICS AS A KEY TO THE ISSUE OF POST-CRISIS DEVELOPMENT

EFFICIENT OFFICIAL STATISTICS AS A KEY TO THE ISSUE OF POST-CRISIS DEVELOPMENT

... В целях оперативного получения информа- ции о ситуации на рынке труда Росстатом ор- ганизовано дополнительное статистическое на- блюдение за просроченной задолженностью по за[r] ... See full document

12

Design and implementation of a low-cost classroom response system for a future classroom in the developing world

Design and implementation of a low-cost classroom response system for a future classroom in the developing world

... results of a ...availability of elaborate physical infrastructure ...adoption of such a system will be higher because of its simplicity, and because in many instances, teachers in developing ... See full document

17

Design as a key for understanding, a pretext for action, a synthesis of knowledge

Design as a key for understanding, a pretext for action, a synthesis of knowledge

... Manner of notation (of analysis, of recognition and of reflection) but Also a machine of action (generative, synthetic and ...mechanism of a complex reality (by layers), while ... See full document

13

Design and FPGA Implementation of Secure Key Management

Design and FPGA Implementation of Secure Key Management

... operation of the latch as an arbiter in all possible delay ...value of each graph is as follow: (1) 350 ps; (2) 200 ps; (3) 100 ps; (4) 0 ps; (5) -350 ...sides of the threshold can give the ... See full document

6

THE PROFIT TARGET IN A RESTAURATION UNIT

THE PROFIT TARGET IN A RESTAURATION UNIT

... represents an economic-social phenomenon characteristic to the modern civilization, well grounded in the life of the society and, therefore, strongly influenced by its ...by an accentuated dynamism, ... See full document

7

Efficient Tracking of MR Tensor Fields Using a Multilayer Neural Network

Efficient Tracking of MR Tensor Fields Using a Multilayer Neural Network

... probability of advancing in a specific direc- tion based on the projection of all the eigenvectors com- ponents into the corresponding directions (making use of more information than merely the ... See full document

11

A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

... The key is encrypted using the RSA algorithm with receiver’s public ...private key to decipher the key and using the key with AES-Rijndael can decrypt the Cipher text to get back the plain ... See full document

4

Control of respiration in fish, amphibians and reptiles

Control of respiration in fish, amphibians and reptiles

... has an oral sucker with which it attaches to ish such as the ...pairs of branchial pouches that are ventilated bidirectionally ...contraction of the muscles around the branchial basket forcing water ... See full document

17

J. Microw. Optoelectron. Electromagn. Appl.  vol.11 número1

J. Microw. Optoelectron. Electromagn. Appl. vol.11 número1

... division of the data is controlled by checking the plots of test and validation errors, at the same time ...is an indication of poorly divided ...number of epoch, and maximum mean ... See full document

10

Show all 10000 documents...