Keywords: هش; Alcohol; Drug use; Hash; Opioid; Saudi therapeutic community;
مقالات ISI هش (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: هش; CS; chitosan; DNA; deoxyribonucleic acid; EDAC; 1-ethyl-3-(3-dimethylaminopropyl)carbodiimide; HA; hyaluronic acid; HASSNH2; hyaluronic acid-co-N-cystaminyl-hyaluronamide; HASH; hyaluronic acid-co-N-cysteaminyl-hyaluronamide; MW; molecular weight; RPE; re
Keywords: هش; Digital watermarking; HTML; Copyrights; HASH; Invisible; Embedding
Keywords: هش; Algorithms; Bloom filters; Hash; Data structures;
Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Keywords: هش; RFID; Hash; Mutual authentication
On the development of high-throughput and area-efficient multi-mode cryptographic hash designs in FPGAs
Keywords: هش; Hash; Authentication; Multi-mode; FPGA
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches
Keywords: هش; PCA; Hash; Sketch; Anomaly detection; Entropy
A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs
Keywords: هش; Fingerprint; Hash; Minimum distance graph; Corresponding search algorithm; Security
Low-complexity video coding via power–rate–distortion optimization
Keywords: هش; Hash; Low-complexity video coding; Motion estimation; Rate–distortion; Power–rate–distortion optimization; Multiview video coding; Wireless multimedia sensor networks; Low-power and power-aware video coding
Neighborhood hash graph kernel for protein–protein interaction extraction
Keywords: هش; Interaction extraction; Hash; Graph kernel; Biomedical literature
Security flaw of Hölbl et al.’s protocol
Keywords: هش; Authentication; Hash; Cryptanalysis; Password
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Keywords: هش; Chaos; Hash; Semi-group; Key agreement; Replaying attack; Time-stamp
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Keywords: هش; RFID; EPCglobal; Security; CRC; Hash
A novel key agreement protocol based on chaotic maps
Keywords: هش; Chaos; Hash; Semi-group; Key agreement; Information security
Mass image classification
Keywords: هش; Mass image classification; Hash; MD5; Indecent images of children; Thumbnails; Skin tone analysis
Identifying an existing file via KaZaA artefacts
Keywords: هش; KaZaA; P2P; FastTrack; MD5; Hash; Peer to peer
Secure remote user access over insecure networks
Keywords: هش; authentication; hash; network; password; security; user; vulnerability
Investigation of Nicotiana tabacum (+) N. suaveolens cybrids with carpelloid stamens
Keywords: هش; Carpelloid stamens; Cybrids; Cytoplasmic male sterility; Flower development; Mitochondria; Nicotiana; Nuclear-mitochondria interactions; Aflp; amplified fragment length polymorphism; Ash; asymmetric somatic hybrid; Bap; 6-benzylaminopurine; Cms; cytopla