Academic literature on the topic 'KESM'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'KESM.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "KESM"

1

Mayerich, David, Jaerock Kwon, Chul Sung, Louise Abbott, John Keyser, and Yoonsuck Choe. "Fast macro-scale transmission imaging of microvascular networks using KESM." Biomedical Optics Express 2, no. 10 (2011): 2888. http://dx.doi.org/10.1364/boe.2.002888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saadatifard, Laila, and David Mayerich. "Three Dimensional Parallel Automated Segmentation of Neural Soma in Large KESM Images of Brain Tissue." Microscopy and Microanalysis 22, S3 (2016): 788–89. http://dx.doi.org/10.1017/s1431927616004797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

KILIÇ, İbrahim, and Servet DEMİRDAĞ. "KÖPRÜLÜ ELMAS TEL KESME MAKİNESİ İLE ZİNCİRLİ KOLLU KESİCİ MAKİNENİN KESİM PERFORMANSLARININ KARŞILAŞTIRILMASI." Uludağ University Journal of The Faculty of Engineering 26, no. 2 (2021): 509–26. http://dx.doi.org/10.17482/uumfd.825755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Youngkyung, Dong Hoon Lee, and Jong Hwan Park. "Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs." Applied Sciences 11, no. 8 (2021): 3367. http://dx.doi.org/10.3390/app11083367.

Full text
Abstract:
Non-interactive zero-knowledge (NIZK) proofs for chosen-ciphertext security are generally considered to give an impractical construction. An interesting recent work by Seo, Abdalla, Lee, and Park (Information Sciences, July 2019) proposed an efficient semi-generic conversion method for achieving chosen-ciphertext security based on NIZK proofs in the random oracle model. The recent work by Seo et al. demonstrated that the semi-generic conversion method transforms a one-way (OW)-secure key encapsulation mechanism (KEM) into a chosen-ciphertext secure KEM while preserving tight security reduction
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Xiangxue, Haifeng Qian, Yu Yu, Jian Weng, and Yuan Zhou. "Signcryption KEM/tag-KEM, revisited." Security and Communication Networks 8, no. 17 (2015): 3067–82. http://dx.doi.org/10.1002/sec.1232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hiltensperger, Monika. "Im Keim ersticken." intensiv 19, no. 06 (2011): 288–92. http://dx.doi.org/10.1055/s-0031-1292767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Christensen, Anke, and Dorothea Ruhe. "Keim im Heim." Heilberufe 64, no. 10 (2012): 54–57. http://dx.doi.org/10.1007/s00058-012-1046-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grieve, Oliver. "Keim — Krise — Kommunikation." Heilberufe 69, no. 6 (2017): 36–38. http://dx.doi.org/10.1007/s00058-017-2839-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yuan, Chen, and Dong Qingkuan. "RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions." Security and Communication Networks 7, no. 8 (2013): 1219–31. http://dx.doi.org/10.1002/sec.853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

He, Wenming, Yanqing Xie, Haoxuan Lu, Mingjing Wang, and Huiling Chen. "Predicting Coronary Atherosclerotic Heart Disease: An Extreme Learning Machine with Improved Salp Swarm Algorithm." Symmetry 12, no. 10 (2020): 1651. http://dx.doi.org/10.3390/sym12101651.

Full text
Abstract:
To provide an available diagnostic model for diagnosing coronary atherosclerotic heart disease to provide an auxiliary function for doctors, we proposed a new evolutionary classification model in this paper. The core of the prediction model is a kernel extreme learning machine (KELM) optimized by an improved salp swarm algorithm (SSA). To get a better subset of parameters and features, the space transformation mechanism is introduced in the optimization core to improve SSA for obtaining an optimal KELM model. The KELM model for the diagnosis of coronary atherosclerotic heart disease (STSSA-KEL
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "KESM"

1

Wawersich, Christian Walter Alois. "KESO: Konstruktiver Speicherschutz für Eingebettete Systeme." kostenfrei, 2009. http://d-nb.info/999753150/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gbem, Thaddeus Terlumun [Verfasser], Soerge [Akademischer Betreuer] Kelm, and Jonathan [Akademischer Betreuer] Nok. "Biochemical characterisation of trans-sialidases from Trypanosoma congolense / Thaddeus Terlumun Gbem. Gutachter: Soerge Kelm ; Jonathan Nok. Betreuer: Soerge Kelm." Bremen : Staats- und Universitätsbibliothek Bremen, 2013. http://d-nb.info/1072156563/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Keim, Lea Sophie [Verfasser]. "Leptomeningeale Myelomatose : eine retrospektive Analyse / Lea Sophie Keim." Ulm : Universität Ulm, 2021. http://d-nb.info/1233737511/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lippo, J. (Jenni). "Kyrönjoen yläosan tulvapengerrysalueiden käytön optimointi kesä- ja syystulvatilanteissa." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504021223.

Full text
Abstract:
Tämän työn tarkoituksena on tutkia Kyrönjoen yläosan tulvapengerrysalueiden käytön optimointia kesä- ja syystulvatilanteissa siten, että tulvavahinkokustannukset jäisivät tulvavaara-alueella mahdollisimman pieniksi. Kesä- ja syystulvien aikana maanviljelyskäytössä olevilla tulvapengerrysalueilla voi syntyä satovahinkokustannuksia, mikäli alueille joudutaan johtamaan Kyrönjoesta vettä. Tutkimuksen tavoitteena on myös selvittää, voitaisiinko veden johtamista tulvapengerrysalueille viivästyttää nykyisestä käytännöstä ja mahdollisesti löytää uusi suositus vedenpinnankorkeudelle, jonka ylittyessä v
APA, Harvard, Vancouver, ISO, and other styles
5

Koliwer-Brandl, Hendrik [Verfasser], Sørge [Akademischer Betreuer] Kelm, and Ralf [Akademischer Betreuer] Dringen. "Interaction of Siglec-4 with naturally occurring and synthetic glycoconjugates / Hendrik Koliwer-Brandl. Gutachter: Sørge Kelm ; Ralf Dringen. Betreuer: Sørge Kelm." Bremen : Staats- und Universitätsbibliothek Bremen, 2011. http://d-nb.info/1071842102/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dodenhof, Tanja [Verfasser], Sörge [Akademischer Betreuer] Kelm, and Ingrid M. [Akademischer Betreuer] Weiss. "Identifikation und Charakterisierung von Perlucin Spleißvarianten der marinen Abalone Haliotis laevigata / Tanja Dodenhof. Gutachter: Sörge Kelm ; Ingrid M. Weiss. Betreuer: Sörge Kelm." Bremen : Staats- und Universitätsbibliothek Bremen, 2014. http://d-nb.info/1072304171/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Keim, Christopher [Verfasser]. "Collocation Methods for the Navier-Stokes Equations / Christopher Keim." München : Verlag Dr. Hut, 2017. http://d-nb.info/1128467828/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Limaye, Sarang [Verfasser], Sørge [Akademischer Betreuer] Kelm, and Andreas [Akademischer Betreuer] Dotzauer. "CD33-Related Siglecs in Early Recognition of Tumour Cells and Viruses by Mononuclear Phagocytes / Sarang Limaye. Gutachter: Sørge Kelm ; Andreas Dotzauer. Betreuer: Sørge Kelm." Bremen : Staats- und Universitätsbibliothek Bremen, 2011. http://d-nb.info/1072532565/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kares, Jean Louise. "Playing host to cultural prestige : imperial agency in two Manchu kesi." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/25272.

Full text
Abstract:
Rice Planting and The Hunt, two rare kesi 緙絲 (silk tapestry) in the collection of the Art Gallery of Greater Victoria (Victoria, Canada), dated to the Kangxi period (1662-1722), are part of a program to reshape Chinese culture in order to confirm the legitimacy of the new Qing regime. This thesis situates Rice Planting and The Hunt within the questions of how and why the Manchu played host to the prestige of kesi to reinforce their narrative of imperial lineage and command of high Chinese culture. As a pair, these works contain cultural contradictions as Rice Planting is set in southern Chin
APA, Harvard, Vancouver, ISO, and other styles
10

Dannenberg, Kai [Verfasser], Stefan [Akademischer Betreuer] Biesterfeld, and Malte [Akademischer Betreuer] Kelm. "Diagnostische Treffsicherheit der Perikardergusszytologie / Kai Dannenberg. Gutachter: Stefan Biesterfeld ; Malte Kelm." Düsseldorf : Universitäts- und Landesbibliothek der Heinrich-Heine-Universität Düsseldorf, 2015. http://d-nb.info/1072224542/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "KESM"

1

Cleave, V. J. Van. Family history and information: KIMES, Kymes, Keim, Koyme, Kaim, Keym, Kiehm. V.J. Van Cleave, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manninen, Katri. Kesä Kaliforniassa. Gummerus, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1951-, Koç Yıldırım, ed. Kesk tarihi. Epos, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

ʻAtsadōnthīrayut, Ratthkōn. Kēm ʻappayot. Samnakphim Dō̜kbīa, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kesa prasaṅga. Dharama Pracāra Kameṭī, Shromaṇī Guraduārā Prabandhaka Kameṭī, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chānā, Hāmidula Haka. Kesa hisṭri. Mauli Prakāśanī, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quilliam, Susan. Kes. Penguin, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Till, Lawrence. Kes. Nick Hern Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pisuke, Alfred. Kesk- ja pikamaajooks. "Eesti Raamat", 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dũng, Hàn Thé̂. Tướng râu kẽm. Nhà xuá̂t bản Công an nhân dân, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "KESM"

1

Giacon, Federico, Felix Heuer, and Bertram Poettering. "KEM Combiners." In Public-Key Cryptography – PKC 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76578-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baek, Joonsang, David Galindo, Willy Susilo, and Jianying Zhou. "Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85855-3_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cancik, Hubert, and Hildegard Cancik-Lindemaier. "Karl Theodor Keim (1825–1878)." In Franz Overbeck Werke und Nachlaß. J.B. Metzler, 2010. http://dx.doi.org/10.1007/978-3-476-00008-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hendrich, C., and L. Frommelt. "Keim-orientierte Antibiotikatherapie bei Protheseninfektionen." In Septische Knochen-und Gelenkchirurgie. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-642-59302-4_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dent, Alexander W. "A Designer’s Guide to KEMs." In Cryptography and Coding. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40974-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meyer, Andreas. "Freistiche als Benutzerdefinierte KEs." In Creo Parametric 3.0 für Fortgeschrittene – kurz und bündig. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-11892-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schneider, Jürgen. "Die Kontingente Evaluierungsmethode (KEM)." In Die ökonomische Bewertung von Umweltprojekten. Physica-Verlag HD, 2001. http://dx.doi.org/10.1007/978-3-662-41572-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Böhle, Fritz, Markus Bürgermeister, and Stephanie Porschen. "Das Projekt KES-MI." In Innovation durch Management des Informellen. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-24341-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Achatzi, Andreas. "Freistiche als Benutzerdefinierte KEs." In Creo Parametric 6.0 für Fortgeschrittene – kurz und bündig. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-27878-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gußmann, Peter. "Praktische Berechnungen mit KEM." In Nichtlineare Berechnungen im Konstruktiven Ingenieurbau. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/978-3-642-95587-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "KESM"

1

Thomm, Isabella, Michael Stilkerich, Christian Wawersich, and Wolfgang Schröder-Preikschat. "KESO." In the 8th International Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1850771.1850788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ali, Maqbool, Sungyoung Lee, and Byeong Ho Kang. "KEM-DT." In IMCOM '18: The 12th International Conference on Ubiquitous Information Management and Communication. ACM, 2018. http://dx.doi.org/10.1145/3164541.3164640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ståhl, Ola. "Long Kesh: Site - Sign - Body." In Design Research Society Conference 2016. Design Research Society, 2016. http://dx.doi.org/10.21606/drs.2016.236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Syed Abrar, Bilal Ahmad Alvi, and Muhammad Asif. "OPGW - our experience in KESC." In Energy Conference (EPEC). IEEE, 2008. http://dx.doi.org/10.1109/epc.2008.4763296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tan, Chik How. "Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles." In 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Message from the KESE 2009 Chair." In 2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/kese.2009.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krupnova, N. A., Y. V. Roslov, E. V. Isanina, N. V. Sharov, and V. A. Rakitov. "Seismic Tomography Results along Deep Sounding Lines Kalevala-Kem’-White Sea and Kandalaksha-Kem’." In 2nd EAGE St Petersburg International Conference and Exhibition on Geosciences. European Association of Geoscientists & Engineers, 2006. http://dx.doi.org/10.3997/2214-4609-pdb.20.p131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahuja, Bhawna, and Virendra P. Vishwakarma. "Local Feature Extraction based KELM for Face Recognition." In 2019 Twelfth International Conference on Contemporary Computing (IC3). IEEE, 2019. http://dx.doi.org/10.1109/ic3.2019.8844888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yan, Liping, Xuezhi Dong, Hualiang Zhang, and Haisheng Chen. "A Feature Weighted Kernel Extreme Learning Machine Ensemble Method for Gas Turbine Fault Diagnosis." In ASME Turbo Expo 2020: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/gt2020-14188.

Full text
Abstract:
Abstract Fault diagnosis is a very important section of gas turbine maintenance. Kernel extreme learning machine (KELM), a novel artificial intelligence algorithm, is a potentially effective diagnosis technology. The existing KELMs are all assumed that there is the same influence to the optimal separating hyperplane from all features, which reduces its generalization performance. In this study, a feature weighted kernel extreme learning machine ensemble method (FWKELM-RF) is developed for application in the field of gas turbine fault diagnosis. First, information gain ratio is introduced to as
APA, Harvard, Vancouver, ISO, and other styles
10

Johnson, Anthony, Martin Dooley, Andrew G. Gibson, and S. M. Barrans. "Practical energy storage utilising Kinetic Energy Storage Batteries (KESB)." In 2012 2nd International Symposium on Environment-Friendly Energies and Applications (EFEA). IEEE, 2012. http://dx.doi.org/10.1109/efea.2012.6294076.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "KESM"

1

Randall, J., B. Kaliski, J. Brainard, and S. Turner. Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kitoh, Kozo, Akio Kita, Yoshihiro Fujiura, et al. Study on the Underbody Flow of the Vehicle (CFD Analysis Via KEM/RSM for Simplified Underbody Configuration). SAE International, 2005. http://dx.doi.org/10.4271/2005-08-0328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!