محصولات
Modern Cryptography Volume 2 A Classical Introduction to Informational and Mathematical Principle - Original PDF
Modern Cryptography Volume 2 A Classical Introduction to Informational and Mathematical Principle - Original PDF
نویسندگان: Zhiyong Zheng · Kun Tian · Fengxia Liu خلاصه: Preface For integer factorization and discrete logarithm calculation, P.W.Shor published an effective quantum calculation in SIAM Journal on Computing in 1997, which is called the Shor algorithm in academic circles. Classical public key cryptosystems such as RSA, ECC and so on could not resist the attack of the Shor algorithm, so the major security risks of public key cryptosystems are completely exposed to the Shor algorithm and quantum computer. In the past 20 years, the rise and development of post-quantum cryptography have close relation with the lattice cryptosystems. The academic community believes that the hard problems on lattice, such as the shortest vector problem (SVP), the continuous shortest vector problem (SIVP) and the determination of the shortest vector problem (GapSVP) can resist quantum computing effectively, so the public key cryptosystems based on the hard problems on lattice become the core theory and technology of the post-quantum cryptography. At present, there are six kinds of published post-quantum cryptosystems: 1. Ajtai-Dwork cryptosystem (1997). Ajtai constructed a collision-resistant Hash function by the circulant matrix and ideal matrix, and converted the collision point into the shortest vector problem on q-ary integer lattice. Ajtai first proposed the concept of random lattice (Gauss lattice) in 1996, and established the famous reduction principle ‘from the worst case to the average case’. The security of Ajtai-Dwork cryptosystem could be fully proved by this reduction principle. 2. GGH/HNF cryptosystem (1997). In 1997, Goldereich, Goldwasser and Halevi constructed a public key cryptosystem based on the closest vector problem on the q-ary integer lattice, which was further improved by Micciancio using the Hermite normal basis in 2005. The idea of Micciancio is very simple. Since the HNF basis of any lattice can be easily computed from its generated matrix, the GGH cryptosystem uses the HNF basis as the public key directly. 3. NTRU cryptosystem (1998). Number Theory Research Unit (NTRU) is a quantum-resistant computing public key cryptosystem developed by J. Hoffstein, J. Pipher and J. H. Silverman in Brown University in 1998, which has become the most attractive post-quantum cryptosystem due to its simple algorithm, fas
Postal Strategies Logistics, Access, and the Environment - Original PDF
Postal Strategies Logistics, Access, and the Environment - Original PDF
نویسندگان: Pier Luigi Parcu · Timothy J. Brennan · Victor Glass خلاصه: With continuously growing e-commerce with its increased demand for fast delivery, various e-commerce players have decided to enter this market to improve both efficiency and effectiveness of the service. Vertically integrated digital market- places’ business models, however, raise the concerns of competition and regulatory authorities across the world because of the anti-competitive behaviours they might facilitate. The paper discusses motivations behind and potential implications for competition of the logistic choices in last-mile delivery of important e-commerce platforms, providing a comparison between Amazon, Alibaba and Allegro
Pandemic and the City - Original PDF
Pandemic and the City - Original PDF
نویسندگان: Mehmet Güney Celbi ̧s · Karima Kourtit · Peter Nijkamp خلاصه: The recent COVID-19 experience has left deep traces in the urban fabric and has prompted a re-orientation regarding the future of cities. Is an urban overhaul on the way? And will digital technology erode conventional urban agglomeration advan- tages? The socioeconomic impacts of the pandemic will definitely leave their mark on cities. For example, the digital divide has already become more apparent regarding equitable access to education or to virtual libraries. Furthermore, climate change will have a stronger influence on cities than in the past, given that avoiding close indoor activities or reducing dense concentrations of people may become commonplace. For example, operating restaurants with outside dining areas or organizing open-air activities which allow safe social distancing will face new challenges in cities, in particular in places where weather conditions may become less favorable
Global Cooperation and G20 Role of Finance Track - Original PDF
Global Cooperation and G20 Role of Finance Track - Original PDF
نویسندگان: Saon Ray · Samridhi Jain · Vasundhara Thakur · Smita Miglani خلاصه: The realisation that emerging economies were becoming systematically important dawned on the major advanced economies with the Asian and Russian financial crises of the late 1990s, and hence, the necessity was felt for a larger forum than the G7 encompassing the emerging economies. The Group of Twenty Countries (G20) was launched as a forum of the finance ministers and Central Bank governors primarily to address the challenges to international financial stability that had begun in Asia in 1997. The need was felt for a “permanent forum” for informal dialogue between developing and developed countries in the G20. The need for the inclusion of major emerging economies in discussions on the international financial system was underlined by the global financial crisis of 2008. A platform was created where leaders of systemically important countries resolved to coordinate macroeconomic policies to counteract the global financial crisis. In turn, they analysed the deeper, underlying causes of the financial crisis. This chapter introduces and motivates the book and discusses the rationale behind the formation of the G20. It discusses the background of the G20, the role of G7 and G8, and discusses the organisation of the book in the chapters that follow
Regulating the Metaverse By Ignas Kalpokas, Julija Kalpokienė - Original PDF
Regulating the Metaverse By Ignas Kalpokas, Julija Kalpokienė - Original PDF
نویسندگان: Ignas Kalpokas, Julija Kalpokienė خلاصه: A Critical Assessment
HCI International 2022 – Late Breaking Posters - Original PDF
HCI International 2022 – Late Breaking Posters - Original PDF
نویسندگان: Constantine Stephanidis, Margherita Antona, Stavroula Ntoa, Gavriel Salvendy خلاصه: 4 P. Asghari et al. 1 Introduction Eye tracking (ET) is frequently used, for example, in behavioral research and human-computer interaction. Eye movement patterns can reveal detailed infor- mation about the user’s cognitive processes, their attention level, or decision- making processes [3,12]. Applications and research based on ET require reliable and robust data [9]. Traditionally, this requires dedicated hardware with high- resolution cameras and infrared illumination to detect corneal reflections [7]. However, dedicated hardware is expensive and thus limits the pervasive use in real-world applications. This situation may change since, propelled by recent advances in deep learning, appearance-based gaze estimation methods that deliver promising results based on low-cost consumer-grade camera inputs start to emerge [2,10,11,21]. These approaches learn to estimate gazes from a video stream based on large-scale data sets and provide 3D gaze vectors or correspond- ing 2D gaze locations on a screen. Furthermore, they do not require any specific external devices and can be used with standalone computers, laptop built-in webcams, or mobile device consumer-grade cameras. This opens up the possi- bility of developing affordable automated intelligent ET solutions for research, commerce, and the general public. On the way to realize this ambition, webcam ET (wcET) has to address several challenges including gaze estimation accu- racy, gaze estimator prediction time, and that gaze estimation quality can be affected by user movements [11]. This paper aims to contribute to the first step toward utilizing wcET as a low-cost pervasive technology by validating the data quality of a state-of-the-art wcET approach in comparison to the performance of an established, commercially available dedicated eye tracking (dhET) system. Accordingly, we address the following research question in our work: How does the gaze estimates of wcET differ from dhET in practical settings regarding accu- racy, precision, and sampling rate? We will further discuss how the limitations of the data quality may affect the performance of wcET applications
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) - Original PDF
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) - Original PDF
نویسندگان: Nadia Nedjah, Gregorio Martínez Pérez, B. B. Gupta خلاصه: Presents research works in the field of cyber security, privacy, and networking Provides results of ICSPN 2021, organized during September 09–11, 2022, in Thailand in online mode Serves as a reference for researchers and practitioners in academia and industry
50 Literacy Strategies Step by Step Fourth Edition - Original PDF
50 Literacy Strategies Step by Step Fourth Edition - Original PDF
نویسندگان: Gail E. Tompkins خلاصه: Young children write “All About . . .” books on familiar topics (Tompkins, 2012). They put together a booklet with four or five pages, write a sentence or two on each page, and add illustrations to elaborate the information presented in the text. Stu- dents read the book to the teacher, who helps them elaborate ideas and correct mechani- cal errors before they share from the author’s chair (see p. 10). As they gain experience writing books with one or two sentences per page, students can expand and elaborate the information they share on each page, gradually increasing the length to a paragraph
The Man Who Understood Democracy - Epub + Converted PDF
The Man Who Understood Democracy - Epub + Converted PDF
نویسندگان: Olivier Zunz خلاصه: Go back in time. Examine the babe when still in its mother’s arms. See the external world reflected for the first time in the still-dark mirror of his intelligence. Contemplate the first models to make an impression on him. Listen to the words that first awaken his dormant powers of thought. Take note, finally, of the first battles he is obliged to fight. Only then will you understand where the prejudices, habits, and passions that will dominate his life come from. In a manner of speaking, the whole man already lies swaddled in his cradle.1 Alexis de Tocqueville made these observations in Democracy in America to explain his rationale for studying America’s “point of departure.” Of course, the beginning is also where the biographer must start. For the young Tocqueville, that external world was dominated by figures from the highest military and administrative nobility of the Ancien Régime, survivors of the Revolutionary Terror, loyal to the exiled Bourbons, and dead set against the liberal views Tocqueville himself would eventually embrace. Presaging this divergence, Tocqueville displayed considerable independence of mind at an early age, and he repeatedly flouted expectations. At the same time, he developed the habit of casting doubt on much of what he did and saw
AN INTRODUCTION TO PERFORMANCE ANALYSIS OF SPORT - Original PDF
AN INTRODUCTION TO PERFORMANCE ANALYSIS OF SPORT - Original PDF
نویسندگان: PETER O’DONOGHUE خلاصه: This introductory chapter introduces sports performance analysis by asking the following questions: What? Why? Who? Where? When? and How? What is sports performance analysis? What are sports performance data and information? Why do we analyse sports performance? Who analyses sports performance? Where is sports performance analysis done? When is sports performance analysis done? How is sports perform- ance analysis done? The answers to these questions are not independent. The reason why sports performance analysis is done and who requires the information can dictate what information is required. The informa- tion required can in turn influence when it is needed and thus when sports performances should be analysed. The time at which information is needed and economic constraints dictate the methods and locations of sports performance analysis tasks. These questions will be answered in turn but readers can expect some necessary overlap between the answers.

آیا کتاب مورد نظر هنوز بر روی سایت قرار نگرفته است؟ جای نگرانی نیست! کافی است بر روی گزینه سفارش کتاب کلیک کرده و درخواست خود را ثبت کنید. در کمتر از چند ساعت کتاب شما را آماده خواهیم کرد.