Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 2.463
11.
  • Distinctive Characteristics... Distinctive Characteristics of Internal Fracture in Tough Double Network Hydrogels Revealed by Various Modes of Stretching
    Mai, Thanh-Tam; Matsuda, Takahiro; Nakajima, Tasuku ... Macromolecules, 07/2018, Letnik: 51, Številka: 14
    Journal Article
    Recenzirano

    The cyclic stretching measurements in various geometries including uniaxial, planar, unequal, and equal biaxial extension reveal the distinctive features of the internal fracture in the double ...
Celotno besedilo
Dostopno za: IJS, KILJ, NUK, PNG, UL, UM
12.
  • Experimental Demonstration ... Experimental Demonstration of Wave Source Location Estimation Method for Spectrum Sharing in 28-GHz-Band 5G System
    Suganuma, Hirofumi; Mitsui, Tsutomu; Matsuda, Takahiro IEEE access, 2023, Letnik: 11
    Journal Article
    Recenzirano
    Odprti dostop

    This paper experimentally investigates a direction of arrival (DOA)-based wave source location estimation method for spectrum sharing in millimeter-wave band local and private fifth-generation (5G) ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
13.
  • Generic transformation from... Generic transformation from broadcast encryption to round-optimal deniable ring authentication
    Hara, Keisuke; Matsuda, Takahiro; Hanaoka, Goichiro ... Designs, codes, and cryptography, 02/2022, Letnik: 90, Številka: 2
    Journal Article
    Recenzirano

    Deniable ring authentication enables a prover in some group (called a ring ) to authenticate a message to a verifier using its secret key while at the same time allowing the prover to deny ever ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
14.
Celotno besedilo

PDF
15.
  • A Cooperative Transmission ... A Cooperative Transmission Scheme in Drone-Based Networks
    Hiraguri, Takefumi; Nishimori, Kentaro; Shitara, Isamu ... IEEE transactions on vehicular technology, 03/2020, Letnik: 69, Številka: 3
    Journal Article
    Recenzirano

    In this paper, we propose an uplink multiuser-multiple input multiple output (MU-MIMO) cooperative retransmission control scheme for the reliable and efficient communication of autonomous unmanned ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
16.
  • A comparison of methods for... A comparison of methods for sketch-based 3D shape retrieval
    Li, Bo; Lu, Yijuan; Godil, Afzal ... Computer vision and image understanding, 02/2014, Letnik: 119
    Journal Article
    Recenzirano
    Odprti dostop

    •Build a small scale and a large scale sketch-based 3D model retrieval benchmark.•Evaluate 15 best sketch-based 3D model retrieval algorithms on the two benchmarks.•Solicit and identify the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPUK

PDF
17.
  • Receiver Selective Opening ... Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption
    HARA, Keisuke; MATSUDA, Takahiro; TANAKA, Keisuke IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 03/2022, Letnik: E105.A, Številka: 3
    Journal Article
    Recenzirano

    In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for an identity-based encryption (IBE) scheme considers adversaries that can corrupt some ...
Celotno besedilo
Dostopno za: NUK, UL, UM
18.
  • Maliciously circuit-private... Maliciously circuit-private multi-key FHE and MPC based on LWE
    Attrapadung, Nuttapong; Hanaoka, Goichiro; Hiromasa, Ryo ... Designs, codes, and cryptography, 05/2023, Letnik: 91, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our schemes are based on learning with errors (LWE) ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
19.
  • Autonomous Drone-Based Poll... Autonomous Drone-Based Pollination System Using AI Classifier to Replace Bees for Greenhouse Tomato Cultivation
    Hiraguri, Takefumi; Shimizu, Hiroyuki; Kimura, Tomotaka ... IEEE access, 01/2023, Letnik: 11
    Journal Article
    Recenzirano
    Odprti dostop

    In greenhouse tomato cultivation, three primary methods of flower pollination exist: insect pollination, physical pollination by vibrating flowers, and artificial pollination using hormone-based ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
20.
  • Damage cross-effect and ani... Damage cross-effect and anisotropy in tough double network hydrogels revealed by biaxial stretching
    Mai, Thanh-Tam; Matsuda, Takahiro; Nakajima, Tasuku ... Soft matter, 05/2019, Letnik: 15, Številka: 18
    Journal Article
    Recenzirano

    Anisotropy of strain-induced internal damage in tough double network (DN) hydrogels is characterized by a sequence of two tensile experiments. Firstly, the virgin DN gels are subjected to a single ...
Celotno besedilo
Dostopno za: IJS, KILJ, NUK, UL, UM
1 2 3 4 5
zadetkov: 2.463

Nalaganje filtrov