• No results found

arbitrary length

Pauli problem for a spin of arbitrary length: A simple method to determine its wave function

Pauli problem for a spin of arbitrary length: A simple method to determine its wave function

... Pauli problem for a spin of arbitrary length: A simple method to determine its wave function Stefan Weigert Institut fur Physik der Universitat Basel, Klingelbergstrasse 82, 4056 Basel, [r] ...

10

Periodic solutions of arbitrary length in a simple integer iteration

Periodic solutions of arbitrary length in a simple integer iteration

... PERIODIC SOLUTIONS OF ARBITRARY LENGTH IN A SIMPLE INTEGER ITERATION DEAN CLARK Received 28 May 2005; Accepted 19 July 2005 We prove that all solutions to the nonlinear second order difference equatio[.] ...

9

An Efficient Encryption Scheme for Small Arbitrary Length Domains

An Efficient Encryption Scheme for Small Arbitrary Length Domains

... Each and every character in the plain text is mapped into integer value since the proposed system handles only integer domain. Actual encryption is based on AES-CTR mode which supports arbitrary length ...

6

Sponge  based  CCA2  secure  asymmetric  encryption  for  arbitrary  length  message

Sponge based CCA2 secure asymmetric encryption for arbitrary length message

... OAEP and other similar schemes proven secure in Random-Oracle Model require one or more hash functions with output size larger than those of standard hash functions. In this paper, we show that by utilizing popular ...

24

FNR :  Arbitrary  length  small  domain  block  cipher  proposal

FNR : Arbitrary length small domain block cipher proposal

... been proposed in [3],[10]. These constructions require multiple application of original block ci- pher in order to make them arbitrary length block ciphers. This makes them computation- ally intensive and ...

8

Prediction of Deflection of Cantilever Beam of Any Arbitrary Length Using Soft Computation Technique

Prediction of Deflection of Cantilever Beam of Any Arbitrary Length Using Soft Computation Technique

... In 2016 Gaurav et al. [10] studied the large deflection of cantilever beam using Artificial Neural Networking (ANN). In this paper, the large deflection is analyzed for fixed length and some loads and predict the ...

9

Separations  in  Circular  Security  for  Arbitrary  Length  Key  Cycles

Separations in Circular Security for Arbitrary Length Key Cycles

... Key recovery from n-circular insecurity: One interesting question posed in the setting of circular security is what is the right definition of security. While preventing against cycle detection is seemingly the strongest ...

18

Generating and Evaluating Summaries for Partial Email Threads: Conversational Bayesian Surprise and Silver Standards

Generating and Evaluating Summaries for Partial Email Threads: Conversational Bayesian Surprise and Silver Standards

... versation. Variations in EGS sentence distribution become a concern when generating silver standard PT summaries. In some cases, there may not be enough EGS sentences in a given PT to form a sil- ver standard summary; in ...

10

Beginning, crises, and end of the money economy

Beginning, crises, and end of the money economy

... In summary: since the household sector eventually has to pay off all overdrafts, the business sector’s profits of an expansion phase of arbitrary length will exactly be wiped out by the [r] ...

18

Exploring Adaptor Grammars for Native Language Identification

Exploring Adaptor Grammars for Native Language Identification

... The task of inferring the native language of an author based on texts written in a second language has generally been tackled as a clas- sification problem, typically using as features a mix of n-grams over characters ...

11

Design of New Hash Algorithm with Integration of Key based on the Review of Standard Hash Algorithms

Design of New Hash Algorithm with Integration of Key based on the Review of Standard Hash Algorithms

... Cryptographic Hash Functions are main building block of message integrity. These functions have many information security applications such as Digital Signatures, Message Authentication, Data Integrity and Key ...

8

Error Mining for Wide Coverage Grammar Engineering

Error Mining for Wide Coverage Grammar Engineering

... To compute the frequency of word sequences of arbitrary length for very large corpora, we use a new combination of suffix arrays and perfect hash finite automata.. This implementation is[r] ...

8

A Cascaded Classification Approach to Semantic Head Recognition

A Cascaded Classification Approach to Semantic Head Recognition

... Most NLP systems use tokenization as part of preprocessing. Generally, tokenizers are based on simple heuristics and do not recog- nize multi-word units (MWUs) like hot dog or black hole unless a precompiled list of MWUs ...

11

Hash Code Based Security In Cloud Computing

Hash Code Based Security In Cloud Computing

... In this paper we have proposed a dedicated hash function HMACMD5 that takes a message of arbitrary length and.. converts it into a 32 bit hash value.[r] ...

5

Impossible  plaintext  cryptanalysis   and  probable-plaintext  collision  attacks  of 64-bit  block  cipher  modes

Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes

... A block cipher encryption mode of operation is an algorithm for en- crypting arbitrary-length plaintexts using a block cipher, which logically breaks the plaintext into w-bit blocks, and[r] ...

16

Difference Sets of Null Density Subsets of N

Difference Sets of Null Density Subsets of N

... long standing conjecture that like sets with positive upper density they have arithmetic progression of arbitrary length.. Keywords: Difference Set; Density; * -Set.[r] ...

5

Online Full Text

Online Full Text

... VI. CONCLUSION AND FUTURE WORK The introduced algorithm is a multi-step ahead time series forecasting algorithm that represents an enhancement to the pattern matching for demand forecasting algorithm. We compensated a ...

7

Labeled  PSI  from  Fully  Homomorphic  Encryption  with  Malicious  Security

Labeled PSI from Fully Homomorphic Encryption with Malicious Security

... Given this significant improvement, our protocol still achieves a similar communication over- head, and often better online running times. For example, when comparing |X| = 2 24 and |Y | = 5535, our protocol requires 16 ...

26

Ring-Based Optimal-Level Distributed Wavelet Transform with Arbitrary Filter Length for Wireless Sensor Networks

Ring-Based Optimal-Level Distributed Wavelet Transform with Arbitrary Filter Length for Wireless Sensor Networks

... the “border effect” particularly. Transforming level is another important property of wavelet transform. Although higher compression efficiency can be obtained along with increas- ing transforming levels, additional energy ...

11

Vol 11, No 2 (2020)

Vol 11, No 2 (2020)

... In this paper, we have derived a formula for the maximum number of non-intersecting diagonals in an 𝑛𝑛 × 𝑛𝑛 array, for any arbitrary length l of the diagonal and for 𝑛𝑛 ≡ 0 (𝑚𝑚𝑚𝑚𝑚𝑚(𝑙𝑙 + 1)) . In the process ...

9

Show all 10000 documents...

Related subjects