Academic literature on the topic 'UACI'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'UACI.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "UACI"

1

Riski, Abduh, Heri Purwantoro, and Ahmad Kamsyakawuni. "PENYEMBUNYIAN CIPHERTEXT ALGORITMA GOST PADA CITRA KE DALAM AUDIO DENGAN METODE LEAST SIGNIFICANT BIT." Jurnal Ilmiah Matematika dan Pendidikan Matematika 10, no. 2 (2018): 49. http://dx.doi.org/10.20884/1.jmp.2018.10.2.2844.

Full text
Abstract:
Government Standard (GOST) is a 64-bit block cipher algorithm with 32 round, use a 256-bit key. The weakness of this algorithm is the keys so simple, than make cryptanalyst easy to break this algorithm. Least Significant Bit (LSB) use to insert message into another form without changing the form of the cover after insertion. This research does by hiding encrypted ciphertext to image and hiding image into audio. This research use grayscale and RBG image with BMP and PNG format. Audio using music with wav format. Security analysis using differential analysis NPCR and UACI. Security analysis aims
APA, Harvard, Vancouver, ISO, and other styles
2

Purnamasari, Dewi, Didin Herlinudinkhaji, and Muhammad Zairon Mauludin. "Analisis Kualitas Citra Foveal Avascular Zone (FAZ) Dengan Teknik Kombinasi Pengacakan Piksel." Jurnal Pepadun 4, no. 3 (2023): 325–33. http://dx.doi.org/10.23960/pepadun.v4i3.181.

Full text
Abstract:
Securing important data or information is done to prevent the leakage of a message or information to people who are not entitled to receive it not entitled to receive. Securing data can be done by using an encoding technique called cryptography. In this research, the data used is a message/information in the form of an RGB Fovea Avascular Zone (FAZ) image as many as 15 images. The message or information in the research is encoded using the Pixel Scrambling Combination Technique. The purpose of encrypting this RGB image is to find out how the encryption and decryption steps and the results of t
APA, Harvard, Vancouver, ISO, and other styles
3

Hidayati, Layli Nur, Gita Fadila Fitriana, and Ipam Fuadina Adam. "Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI." JURIKOM (Jurnal Riset Komputer) 8, no. 6 (2021): 274. http://dx.doi.org/10.30865/jurikom.v8i6.3624.

Full text
Abstract:
The need for data security arises because of the many threats made by outside parties to retrieve data and use it for personal interests. Security for medical images is carried out because medical images store patient health information data that is confidential. In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data. This study uses the AES and Camellia algorithms which in their application use several different operating modes. To measure the quality of the encrypted image, the randomnes
APA, Harvard, Vancouver, ISO, and other styles
4

Farandi, Muhammad Naufal Erza, Sri Winarno, and Zahrah Asri Nur Fauzyah. "Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques." SISTEMASI 13, no. 6 (2024): 2638. https://doi.org/10.32520/stmsi.v13i6.4675.

Full text
Abstract:
This study develops a digital image encryption method using a 4D hyperchaotic system combined with a hybrid key to maximize data security. By generating a random and uniform pixel distribution, the method makes decryption significantly harder for unauthorized access. Evaluations are conducted through histogram analysis, robustness tests, NPCR, UACI, and information entropy. The findings reveal that the method effectively breaks pixel correlation, rendering the encrypted image unrecognizable. Histogram analysis confirms a uniform pixel distribution, while robustness tests show the system can ma
APA, Harvard, Vancouver, ISO, and other styles
5

Fatma, Yulia, Soni, and Mikdad Amseno. "Perbandingan Algoritma SIMON dan SPECK Dalam Pengamanan Citra Digital." Jurnal CoSciTech (Computer Science and Information Technology) 5, no. 2 (2024): 250–59. http://dx.doi.org/10.37859/coscitech.v5i2.7619.

Full text
Abstract:
Cryptography is a data security technique by encoding data that is to be kept secret so that the original meaning of the data can no longer be understood. SIMON and SPECK are modern cryptographic algorithms issued by the National Security Agency (NSA). SIMON and SPECK are said to be algorithms that are known for their efficiency and strong security. This research will compare the performance of the SIMON and SPECK algorithms in securing digital images. Comparisons were made by testing time performance, changes in file size, and the level of randomness of image files using the Unified Average C
APA, Harvard, Vancouver, ISO, and other styles
6

Putra, Thomas Adi, Ikhwan Ruslianto, and Syamsul Bahri. "Application of Arnold Cat Map and Logistic Map Methods for Securing Citizens' Data Image." CESS (Journal of Computer Engineering, System and Science) 7, no. 2 (2022): 470. http://dx.doi.org/10.24114/cess.v7i2.36302.

Full text
Abstract:
Keamanan data merupakan salah satu isu yang sangat penting terutama untuk data yang bersifat pribadi baik dalam bentuk tulisan maupun citra. Penerapan kriptografi dapat digunakan untuk mengamankan data agar tidak dapat dimengerti oleh sembarang orang. Pada penelitian ini dilakukan pengamanan data berupa citra KTP dan citra KK menggunakan metode Arnold cat map dan logistic map. Pada pengujian analisa sensitivitas kunci, diperoleh bahwa perubahan kunci dekripsi sebesar 0,0001 dari kunci enkripsi menghasilkan citra yang sangat berbeda dengan citra asal. Pada pengujian analisis diferensial diperol
APA, Harvard, Vancouver, ISO, and other styles
7

Hendarto, Janoe. "ENKRIPSI DAN DEKRIPSI CITRA MENGGUNAKAN METODE FRAKTAL." Produktif : Jurnal Ilmiah Pendidikan Teknologi Informasi 5, no. 2 (2022): 451–60. http://dx.doi.org/10.35568/produktif.v5i2.1744.

Full text
Abstract:
Enkripsi citra dengan metode fraktal adalah proses penyandian yang mengubah citra asli (plain image) menjadi citra yang tidak bisa dimengerti (cipher image) dengan menggunakan citra fraktal (fraktal image). Sedangkan dekripsi citra adalah proses sebaliknya yaitu mengubah cipher image menjadi citra asli. Citra fraktal yang digunakan pada penelitian ini adalah citra himpunan Mandelbrot z2 – c pada domain tertentu, dengan z adalah variabel komplek.
 Pertama, dibahas bagaimana enkripsi dan dekripsi citra warna menggunakan citra himpunan Mandelbrot dengan data domainnya dijadikan sebagai kunci
APA, Harvard, Vancouver, ISO, and other styles
8

Thabit, Zainab Hasan, Sadiq A. Mehdi, and Bashar M. Nema. "Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis." Al-Mustansiriyah Journal of Science 34, no. 4 (2023): 87–95. http://dx.doi.org/10.23851/mjs.v34i4.1411.

Full text
Abstract:
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate
APA, Harvard, Vancouver, ISO, and other styles
9

Shima, Ramesh Maniyath, and V. Thanikaiselvan. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1327–36. https://doi.org/10.11591/ijece.v10i2.pp1327-1336.

Full text
Abstract:
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. T
APA, Harvard, Vancouver, ISO, and other styles
10

Huda R. Shakir, Sadiq A. Mehdi, and Anwar A. Hattab. "A New Method for Color Image Encryption Using Chaotic System and DNA Encoding." Mustansiriyah Journal of Pure and Applied Sciences 1, no. 1 (2022): 68–79. http://dx.doi.org/10.47831/mjpas.v1i1.9.

Full text
Abstract:
Image encryption is an essential area of visual cryptography that helps protect images when they are shared over the internet. There are many cryptography algorithms applied for many years in encrypting images. In recent years, techniques from chaotic systems have been combined with DNA coding to help encrypt images and protect them from unauthorized use. In this study, we proposed a new method for image encryption based on a new four-dimensional chaotic system and DNA encoding. The proposed method consists of two stages: the pixel positions are scrambled depending on which chaotic sequences a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "UACI"

1

Batista, Hadinei Ribeiro. "UAI: estudo de uma interjeição do português brasileiro." Universidade Federal de Minas Gerais, 2013. http://hdl.handle.net/1843/BUOS-9BVJCP.

Full text
Abstract:
This research takes as its object of study the item 'uai'. The purpose is to investigate two issues in relation to this item: a) to present a study about its grammatical and discursive status, and b) to discuss some hypotheses about its origin. For both, it is initially made one discussion about interjections and discourse markers. Then, it is developed one analysis of the variation between 'uai' and the forms 'ué/uê. About the origin, it is investigated the hypothesis of 'uai' has emerged from a diachronic evolution of the word 'olhai'. Beyond this, it is made a discussion of other hypothesis
APA, Harvard, Vancouver, ISO, and other styles
2

Lima, Eliana Carlota Mota Marques. "Mem?rias de leituras de idosos da UATI/UEFS: ressignificando suas hist?rias." Universidade Estadual de Feira de Santana, 2016. http://localhost:8080/tede/handle/tede/433.

Full text
Abstract:
Submitted by Ricardo Cedraz Duque Moliterno (ricardo.moliterno@uefs.br) on 2017-02-01T21:54:08Z No. of bitstreams: 1 Disserta??o - Mem?rias de Leitura de Idosos da UATIUEFS Ressiginificando suas Hist?rias - Eliana .pdf: 1537302 bytes, checksum: ad13c54e49793ff85a4fb426ba30b9a0 (MD5)<br>Made available in DSpace on 2017-02-01T21:54:08Z (GMT). No. of bitstreams: 1 Disserta??o - Mem?rias de Leitura de Idosos da UATIUEFS Ressiginificando suas Hist?rias - Eliana .pdf: 1537302 bytes, checksum: ad13c54e49793ff85a4fb426ba30b9a0 (MD5) Previous issue date: 2016-07-29<br>Despite of the growth of action
APA, Harvard, Vancouver, ISO, and other styles
3

Machado, Fabiana Ferro [UNESP]. "Universidade aberta à terceira idade da Universidade do Sagrado Coração (UATI/USC): estudo de caso." Universidade Estadual Paulista (UNESP), 2004. http://hdl.handle.net/11449/98488.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:29:36Z (GMT). No. of bitstreams: 0 Previous issue date: 2004Bitstream added on 2014-06-13T18:59:10Z : No. of bitstreams: 1 machado_ff_me_botfm.pdf: 349950 bytes, checksum: a7b9beb3b75743e7ae5cef65eadd881e (MD5)<br>Universidade Estadual Paulista (UNESP)<br>Ao mesmo tempo em que o contingente de idosos aumenta no Brasil, ganham força os estudos sobre envelhecimento em novos moldes. Consagra-se com rapidez a expressão terceira idade, justificando esta nova sensibilidade em relação à velhice, considerando-a momento privilegiado da vida. O objetivo do pre
APA, Harvard, Vancouver, ISO, and other styles
4

Jiménez, Pazarán Blanca Azucena, and Sánchez Leydi Marlen Olvera. "Análisis del impacto del clima laboral en el departamento de Parasitología Agrícola de la UACH." Tesis de Licenciatura, Universidad Autónoma del Estado de México, 2016. http://hdl.handle.net/20.500.11799/99186.

Full text
Abstract:
El clima laboral es una variable que tiene un efecto significativo en el comportamiento de los trabajadores y recientemente se ha intensificado su importancia para ser evaluado por todo tipo de organizaciones, la presente investigación va encaminada al análisis del clima laboral en la Universidad Autónoma Chapingo, ubicada en Texcoco, Estado de México que, siendo una de las instituciones más reconocidas a nivel internacional (INEGI, 2015), podría presentar conflictos en esta área. Los primeros capítulos se dedican a una compilación teórica de los conceptos que serán de utilidad para luego abo
APA, Harvard, Vancouver, ISO, and other styles
5

Machado, Fabiana Ferro. "Universidade aberta à terceira idade da Universidade do Sagrado Coração (UATI/USC) : estudo de caso /." Botucatu : [s.n.], 2004. http://hdl.handle.net/11449/98488.

Full text
Abstract:
Orientador : Tania Ruiz<br>Resumo: Ao mesmo tempo em que o contingente de idosos aumenta no Brasil, ganham força os estudos sobre envelhecimento em novos moldes. Consagra-se com rapidez a expressão terceira idade, justificando esta nova sensibilidade em relação à velhice, considerando-a momento privilegiado da vida. O objetivo do presente estudo foi um estudo de caso com os participantes da UATI/USC, saber como vivem a atual fase da vida e como interagem. Os dados foram obtidos através de entrevistas semi-estruturadas e de análise de perguntas fechadas realizada através do Programa Epi-Info ve
APA, Harvard, Vancouver, ISO, and other styles
6

Costa, Alexandre Platt. "Construção de indicadores na assistência ao idoso: um estudo sobre as práticas assistenciais na UAPI Socorro Gabriel." reponame:Repositório Institucional do FGV, 2016. http://hdl.handle.net/10438/17611.

Full text
Abstract:
Submitted by Alexandre Costa (alexandreplatt@yahoo.com.br) on 2016-12-14T23:25:22Z No. of bitstreams: 1 Alexandre Platt Costa Dissertação Mestrado Profissional EBAPE.pdf: 2499512 bytes, checksum: 912d61c25c8c024bf5106b744bc15cc8 (MD5)<br>Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2016-12-15T14:13:38Z (GMT) No. of bitstreams: 1 Alexandre Platt Costa Dissertação Mestrado Profissional EBAPE.pdf: 2499512 bytes, checksum: 912d61c25c8c024bf5106b744bc15cc8 (MD5)<br>Made available in DSpace on 2016-12-20T16:59:03Z (GMT). No. of bitstreams:
APA, Harvard, Vancouver, ISO, and other styles
7

Pires, Neusa Maria dos Santos. "Necessidades informacionais da pessoa idosa: estudo no contexto da Universidade Aberta à Terceira Idade da UNEB." Instituto de Ciência da informação da Universidade Federal da Bahia, 2015. http://repositorio.ufba.br/ri/handle/ri/19199.

Full text
Abstract:
Submitted by Valdinei Souza (neisouza@hotmail.com) on 2016-05-11T21:08:35Z No. of bitstreams: 1 Dissertação Neusa Maria Pires.pdf: 1960645 bytes, checksum: d219aba51a4548496957daf01f34b01d (MD5)<br>Approved for entry into archive by Urania Araujo (urania@ufba.br) on 2016-05-16T18:28:23Z (GMT) No. of bitstreams: 1 Dissertação Neusa Maria Pires.pdf: 1960645 bytes, checksum: d219aba51a4548496957daf01f34b01d (MD5)<br>Made available in DSpace on 2016-05-16T18:28:23Z (GMT). No. of bitstreams: 1 Dissertação Neusa Maria Pires.pdf: 1960645 bytes, checksum: d219aba51a4548496957daf01f34b01d (MD5)<br>
APA, Harvard, Vancouver, ISO, and other styles
8

Oliveira, Denis Renato de. "Unidades de Atendimento Integrado (UAI): um estudo de políticas públicas para o fortalecimento da cidadania no estado de Minas Gerais." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/96/96132/tde-05032015-164436/.

Full text
Abstract:
A estruturação de redes como suporte organizacional à gestão de políticas públicas tem se apresentado, no contexto do Welfare State, como um novo paradigma de organização da ação do Estado frente às constatadas imperfeições do modelo burocrático. Embora se possa relacionar os ganhos decorrentes dessa formação, ainda não se possui uma estrutura conceitual precisa que possibilite a identificação de um padrão gerencial ou determine os elementos de análise essenciais das formas de interação entre os atores, a natureza das atividades envolvidas e a configuração das relações de poder no Modelo de Ge
APA, Harvard, Vancouver, ISO, and other styles
9

Arantes, Rodrigo Caetano. "Uai sô, e agora?: as relações entre fatores sociodemográficos e incapacidades funcionais nas redes sociais de idosos em Belo Horizonte/MG." Universidade Federal de Minas Gerais, 2012. http://hdl.handle.net/1843/AMSA-8V8P2J.

Full text
Abstract:
This thesis aims at analyzing the social networks of the elderly (60 years old and over) in view of demographic and epidemiological factors. To this end, we used data of PNAD's (1998, 2003 and 2008) about Minas Gerais, as well as a quality research with elderly people in Belo Horizonte. The social networks of the elderly would usually comprise family members, in addition to neighbors, friends and acquaintances from religious activities. The elderly with functional disability and lower financial conditions reported greater need to request the instrumental and material support network, respectiv
APA, Harvard, Vancouver, ISO, and other styles
10

Jeon, Ra Hee. "A Child Navigating through an Impossible System All Alone| Disparity in Treatment between Unaccompanied Refugee Minors (URM) and Unaccompanied Alien Children (UAC)." Thesis, Regent University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10277040.

Full text
Abstract:
<p> Unaccompanied orphans are the most vulnerable population, whose sociological, psychological, and legal needs have been far from being met. There are two types of unaccompanied orphans: Unaccompanied Refugee Minors (URM) and Unaccompanied Alien Children (UAC). Even though both URM and UAC are unaccompanied minors, one group enjoys protection as a legal resident, while the other is treated as an undocumented alien. </p><p> Most of URM are brought from overseas to the United States through the State Department program, which grants these children a resettlement in the U.S. due to the lack o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "UACI"

1

Prinst, Darwin. Ndilo uari udan: Mendamaikan manusia dengan alam. Bina Media, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mwanjonde, Peter A. Cheche za uasi: Ukweli wa imani yangu. 2nd ed. Benedictine Publications Ndanda, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Medina, Raúl Torres. UACH 1985: Año de la libertad y la democracia. Centro Librero La Prensa, distribuidor, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ramírez, Liberio Victorino. Determinaciones sociales en el proceso de reforma de la UACH. Universidad Autónoma Chapingo, Departamento de Preparatoria Agrícola, Subdirección de Investigación, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Conference, Universities Association for Continuing Education. The purposes of continuing education: UACE annual conference, Leeds, April 1996. Universities Association for Continuing Education, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oseguera, David, and Liberio Victorino Ramírez. Consolidación de programas y creación de centros de investigación en la UACh. Universidad Autónoma de Chapingo, Subdirección General de Investigación y Servicio, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Paasen, Frank van. Strategi dan rencana aksi lokal kota Semarang untuk peningkatan kualitas udara perkotaan: LSAP UAQi. Badan Perencanaan Pembangunan Nasional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Suhadi, Dollaris R. Strategi dan rencana aksi lokal kota Bandung untuk peningkatan kualitas udara perkotaan: LSAP UAQi. Badan Perencanaan Pembangunan Nasional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ikhwan, Andi. Strategi dan rencana aksi lokal kota Surabaya untuk peningkatan kualitas udara perkotaan: LSAP UAQi. Badan Perencanaan Pembangunan Nasional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Laya, Marisol Silva. Dilemas y desafíos de la equidad en educación superior: El caso de la UACM. Universidad Iberoamericana, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "UACI"

1

Balamurugan, J., Mali Yadav, Jetti Madhavi, A. Basi Reddy, and R. Senthamil Selvan. "Step-by-Step Image Encryption Using UACI and PixAdapt." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-73494-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Iftene, Adrian, Diana Trandabăţ, Ionuţ Pistol, Alex-Mihai Moruz, Maria Husarciuc, and Dan Cristea. "UAIC Participation at QA@CLEF2008." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04447-2_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Drăguşanu, Cristian-Alexandru, Alecsandru Grigoriu, and Adrian Iftene. "UAIC: Participation in INFILE@CLEF Task." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15754-7_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Iftene, Adrian, Ovidiu Ionescu, and George-Răzvan Oancea. "UAIC: Participation in CLEF-IP Track." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15754-7_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Xilin, Liuqing Yang, and Xiang Cheng. "Short-Range Adaptive RA-UAC." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33207-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Iftene, Adrian, Loredana Vamanu, and Cosmina Croitoru. "UAIC at ImageCLEF 2009 Photo Annotation Task." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15751-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Calani Baranauskas, Maria Cecília, and Julián Esteban Gutiérrez Posada. "Universal Access to Interaction as Revealed by UAHCI Words." In Universal Access in Human-Computer Interaction. Design Methods, Tools, and Interaction Techniques for eInclusion. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39188-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Perez, Cenel-Augusto, Cătălina Mărănduc, and Radu Simionescu. "Ro-PAAS – A Resource Linked to the UAIC-Ro-Dep-Treebank." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27060-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Zejin, and Guojun Peng. "An Analysis About the Defects of Windows UAC Mechanism." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5913-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Xilin, Liuqing Yang, and Xiang Cheng. "Energy-Efficient Hybrid Decomposed LT Codes for RA-UAC." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33207-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "UACI"

1

Wang, Xianghan, Zhifeng Pang, Rong Fan, Guoqing Pan, and Yishan Su. "A Novel UAC Modem Design with Two Core Modules." In OCEANS 2024 - SINGAPORE. IEEE, 2024. http://dx.doi.org/10.1109/oceans51537.2024.10682370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Zitong, Qimiao Zeng, Changqiao Xu, et al. "VSR-UAiC: An Upload Adaptive Bitrate Framework in Video Super-Resolution-Enabled Crowdsourced Live Streaming." In GLOBECOM 2024 - 2024 IEEE Global Communications Conference. IEEE, 2024. https://doi.org/10.1109/globecom52923.2024.10901236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mugdho, Al Nahian, Md Ibrahim, A. S. M. Badrudduza, and Aridra Jhalok. "Reconfigurable Intelligent Surfaces in UOW-UAC Integrated Network: A Performance Analysis for the Internet of Underwater Things." In 2024 27th International Conference on Computer and Information Technology (ICCIT). IEEE, 2024. https://doi.org/10.1109/iccit64611.2024.11021994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Negru, Alina Giorgiana, Claudiu Roman, Cornelia Amarandei, Romeo Iulian Olariu, and Cecilia Arsene. "ASSESSING THE OH-INITIATED BREAKDOWN CHEMISTRY OF CAMPHENE AND 3-CARENE UNDER NOX-FREE SIMULATED ATMOSPHERIC CONDITIONS." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024v/4.2/s18.24.

Full text
Abstract:
Camphene and 3-carene are key atmospheric monoterpenes used in cosmetics, fragrances, and food flavouring. In order to assess their impacts on human health and the environment it is essential to have a thorough understanding of the degradation mechanisms involved in their reactivity. The present study aimed to investigate the OH radicals initiated atmospheric degradation of camphene and 3-carene under simulated NOx-free conditions. The experiments were conducted using facilities provided by the 760 L Environmental Simulation Chamber made of Quartz (ESC-Q-UAIC) together with state-of-the-art in
APA, Harvard, Vancouver, ISO, and other styles
5

Manikonda, L., A. Mangalampalli, and V. Pudi. "UACI: Uncertain associative classifier for object class identification in images." In 2010 25th International Conference of Image and Vision Computing New Zealand (IVCNZ). IEEE, 2010. http://dx.doi.org/10.1109/ivcnz.2010.6148859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Головков, Евгений Владимирович, Алексей Игоревич Грохотов, and Владимир Николаевич Кустов. "HYPERHAOS HACS, KNUTH AND DURSTENFELD PROVIDE HYPER-STRONG ENCRYPTION OF COLOR IMAGES." In Анализ и синтез в современной науке: сборник статей международной научной конференции (Кингисепп, Сентябрь 2023). Crossref, 2023. http://dx.doi.org/10.37539/230920.2023.31.72.004.

Full text
Abstract:
В этом исследовании предлагается алгоритм стратегии шифрования изображений, основанный на HACS, и алгоритме скремблирования, для решения проблем ограниченного пространства ключей, небезопасных структур шифрования и простых для взлома существующих методов шифрования. Для начала изображение шифруется с использованием последовательности, сгенерированной с помощью HACS. Эксперименты показывают, что ключевое пространство схемы превышает 2 и что она очень чувствительна к небольшим изменениям в ключах. Гистограмма зашифрованных изображений распределена равномерно. Почти каждый соседний пиксель имеет
APA, Harvard, Vancouver, ISO, and other styles
7

Ozkaynak, Fatih. "Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals." In 2017 International Conference on Computer Science and Engineering (UBMK). IEEE, 2017. http://dx.doi.org/10.1109/ubmk.2017.8093481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Neves, Bruna Leide Cunha das, Bruna Alexandra Silva e. Brigo, RITA DE CÁSSIA LOPES DE OLIVEIRA MENDES, et al. "Programa de Educação Tutorial: a educação popular como instrumento balizador." In Anais do UAI PET. Even3, 2021. http://dx.doi.org/10.29327/159662.1-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sousa, Isabella Ketlin Silva, Ozíris Borges Filho, Elizama Capucci Santos, et al. "Trem das Onze." In Anais do UAI PET. Even3, 2021. http://dx.doi.org/10.29327/159662.1-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Uğur, Latif Onur, and Kadir Penbe. "Comparison of the Performance of “Unit Area Cost Method” (UACM) and “Unit Price Method” (UPM) Used in Estimating the Costs of the Reinforced Concrete Multi-Storey Housing Buildings." In 4th International Conference of Contemporary Affairs in Architecture and Urbanism – Full book proceedings of ICCAUA2020, 20-21 May 2021. Alanya Hamdullah Emin Paşa University, 2021. http://dx.doi.org/10.38027/iccaua2021tr0033n6.

Full text
Abstract:
Unit Price Method (UPM) and Unit Area Cost Method (UACM) are widely used in the cost of reinforced concrete multi-storey housing buildings. In this study, it is aimed to determine the cost estimation method with high performance (its use will provide an advantage to the estimator over the other) by comparing the cost estimates in the modeling by making “Regression Analysis” (RA), with the data of such struction. In the literature review, studies of equivalent and different structures were evaluated. In modeling; Number of rooms, floor area, total area, number of floors, floor height, facade ar
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "UACI"

1

Yang, Liuqing, and Jian Li. MIMO-UAC for Rate Enhancement and Range Extension. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada491511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huff, J., and S. Ochsner. Update Analysis Implementation (UAI) Advanced Technical Prototype (ATP). Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada387653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahouansou, Wildfrid, Fadhel Medard Salifou-Bio, and Arnaud Dangvenon. Academic success of students and educational trajectories: Characteristics and needs for a digital learning environment at the University of Abomey-Calavi. Mary Lou Fulton Teachers College, 2024. http://dx.doi.org/10.14507/mcf-eli.i15.

Full text
Abstract:
The upsurge of COVID-19 proved the need to improve higher education capabilities to continue training even during class discontinuity. In UAC’s context, adopting e-learning is also a way to mitigate the significant number of students enrolled yearly (approximately 60.000) and provide quality education to all. Therefore, this research on students’ success and needs aims to identify the optimal learning conditions conducive to academic and professional success. Targeting two schools of UAC, we investigated the online learning environment, considering material and virtual environments, as well as
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!