Challenge of security
-
Research Aims: The thesis aims to develop deep neural networks for analyzing security data. These techniques improve the accuracy of machine learning-based models applied in NAD. Therefore, the thesis attempts to address the above challenging problems in NAD using models and techniques in deep neural networks. Specifically, the following problems are studied.
128p armyofthedead 23-06-2021 14 3 Download
-
The human population continues to grow steadily with the shrinking resources being used for agricultural production situates great challenge against Indian agricultural system to attain food and environmental security. To counter these twin challenges in the country there is urgent need of application of modern Hi-tech technologies for enhancing the productivity and sustainability of the rice-wheat system for long term on scientific basis. Precision farming (PF) looks a win-win technology towards improving the capability of agricultural land to produce crops on sustainable basis.
10p chauchaungayxua6 26-06-2020 22 2 Download
-
The current challenges related to safety, security and economic efficiency lead to the consolidation of the level of education and training of merchant marine officers, through the interdependence and diversification of the curricula in the world economy of shipping, finance of the maritime industry and the specialized labour market.
9p christabelhuynh 04-06-2020 16 1 Download
-
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called \cryptographic hash functions". The main result of this paper is a negative one: There exist signature and encryption schemes that are secure in the Random Oracle Model, but for which any implementation of the random oracle results in insecure schemes.
37p tai_lieu2014 11-04-2014 65 7 Download
-
We now begin our look at building protocols using the basic tools that we have discussed. The discussion in this lecture will focus on issues of key establishment and the associated notion of authentication These protocols are not real, but instead are meant to serve just as a high-level survey Later lectures will go into specific protocols and will uncover practical challenges faced when implementing these protocols
20p muathu_102 28-01-2013 66 9 Download