Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Standard digital signature algorithm (DSA) and secure hash algorithm (SHA )in public key cryptography
Download
068447.pdf
Date
1997
Author
Ökten, Önder
Metadata
Show full item record
Item Usage Stats
116
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/1526
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Standard model CP violation in B -> X(d)l(+)l(-) decays
Eygi, ZD; Turan, Gürsevil (World Scientific Pub Co Pte Lt, 2003-12-14)
We investigate the CP violating asymmetry, the forward backward asymmetry and the CP violating asymmetry in the forward-backward asymmetry for the inclusive B --> X(d)l(+)l(-) decays for the l = e, mu, tau channels in the standard model. It is observed that these asymmetries are quite sizeable and B --> X(d)l(+)l(-) decays seem promising for investigating CP violation.
Generalized random spreading performance analysis of CDMA over GWSSUS fading channels
Ertuğ, Özgür; Baykal, Buyurman; Department of Electrical and Electronics Engineering (2005)
Since direct-sequence code-division multiple-access (DS-CDMA) is an interference-limited random multiple-access scheme, the reduction of co-channel interference with either interference suppression or interference cancellation multiuser receivers and/or power control to prevent detrimental near-far situations is vital for improved performance. Up to date, some contributions investigated randomly-spread asymptotically - large number of users and large bandwidth - large CDMA systems with multiuser receivers a...
Generalized reliability model for local scour around bridge piers of various shapes
Üstün, İsmail; Yanmaz, A. Melih; Department of Civil Engineering (2000)
Generalized reliability model for local scour around bridge piers of various shapes
Yanmaz, Ali Melih (2001-10-01)
Excessive local scour around piers and abutments is known as a major cause of bridge failure induced by hydraulic deficiencies. Complexity of the scouring phenomenon and high degrees of uncertainties in governing parameters lead to an unavoidable risk in bridge pier design. In this paper, a generalized reliability model based on static resistance-loading interference is developed for the assessment of reliability of bridge scour for various pier shapes. In the model, the relative maximum scour depth and the...
Robust background normalization method for one-channel microarrays
AKAL, TÜLAY; Purutçuoğlu Gazi, Vilda; Weber, Gerhard-Wilhelm (Walter de Gruyter GmbH, 2017-04-01)
Background: Microarray technology, aims to measure the amount of changes in transcripted messages for each gene by RNA via quantifying the colour intensity on the arrays. But due to the different experimental conditions, these measurements can include both systematic and random erroneous signals. For this reason, we present a novel gene expression index, called multi-RGX (Multiple-probe Robust Gene Expression Index) for one-channel microarrays.
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Ö. Ökten, “Standard digital signature algorithm (DSA) and secure hash algorithm (SHA )in public key cryptography,” Middle East Technical University, 1997.