|
|
|
S.A. Bukashkin,M.A. Cherepnev
Pág. 104 - 108
Recently, many papers have appeared where it is proposed to use the quantum mechanical properties of interatomic interaction to solve cryptographic problems. In fact, we are talking about transferring the solution of the problem of the stability of infor...
ver más
|
|
|
|
|
|
Antonio Lopez-Martinez-Carrasco, Jose M. Juarez, Manuel Campos and Bernardo Canovas-Segura
Subgroup Discovery (SD) is a supervised data mining technique for identifying a set of relations (subgroups) among attributes from a dataset with respect to a target attribute. Two key components of this technique are (i) the metric used to quantify a su...
ver más
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
Pietro Burrascano
Modeling the nonlinearity of a system is of primary importance both for optimizing its design and for controlling the behavior of physical systems operating with a wide dynamic range of input values, for which the linearity hypothesis may not be sufficie...
ver más
|
|
|
|
|
|
Juan Carlos Quiroz-Flores, Brenda Abásolo-Núñez, Daniella Suárez-Miñano and S. Nallusamy
This research article focuses on the ergonomic design of the workstations for the plastics industry plant to reduce the postural load that improves the workers? productivity and the operators? absenteeism due to musculoskeletal disorders. This article de...
ver más
|
|
|