Sign In Don't have an account? Register Sign In Yu-Gi-Oh! Wiki Explore Main Page Discuss All Pages Community Interactive Maps Yu-Gi-Oh! Booster Packs Series Booster Pack Rainbow Structure Decks Structure Deck R Starter Decks OCG TCG Latest Banlist Rush Duel Ma...
Anubis (Yu-Gi-Oh!) Ao Oni (Anime) Ao Oni (Composite) Aoi Yusaka Apophis Apostle Appule Aprile Aquarius Camus Aquarius Camus (Toei) Arachne Gorgon Aratari Arba / Gyokuen Arcana Force EX - The Dark Ruler Arcana Force EX - The Light Ruler Arch Lich Archer (Atalanta...
private void addSigningTimeAttribute(final CAdESSignatureParameters parameters, final ASN1EncodableVector signedAttributes) { /* * In PAdES, we don't include the signing time : ETSI TS 102 778-3 V1.2.1 * (2010-07): 4.5.3 signing-time Attribute */ if (padesUsage) { return; } final Da...
#In the future an external attribute certificate authority will be invoked. The format to each entry is: # #attribute-entry-#:{userid};{affiliation};{attributeName};{attributeValue};{valid from};{valid to} # #If valid to is empty the attribute never expire, if the valid from is empty...
iNZL+6CTB36WH8h2NFKwO0IQUl6NWS5bnGSUxgW4pa5ZAUwsYsgTLWLWc7yBSjV1jmpvr6BWNUqVxpYGDc/UCF8ITjA56geszIrD5Gj2l4h4LcQ8bB0VGuYchh3v0bYWch3so8zLJvIhZRZNyttKxyq8iFcIFu+TpSoB5Zr0iFVej9e6ipALQ0fffYbCtfCu9fV6xinlYhYkLZC9Tmx2Avq23HKxCGYcpxqHWv8v34cqhBGojrizBWotSgoGtuGdSAuZkQe3mlQoh...
A LCHV z in Y is constructed using z = (yu, yh), where yu = [yα, yβ] for β≥α and yα, yβ∈ Y is an interval/uncertain LV and yh = Algorithms 2018, 11, x FOR PEER REVIEW Algorithms 2018, 11, 135 3 of 14 3 of 13 { }yh = yλk | yλk ∈ Y , k =...
sensors Article An Incentive Mechanism in Mobile Crowdsourcing Based on Multi-Attribute Reverse Auctions Ying Hu 1, Yingjie Wang 1,*, Yingshu Li 1,2,* and Xiangrong Tong 1 1 School of Computer and Control Engineering, Yantai University, Yantai 264005, China; gaoyang@ytu.edu.cn (Y.H.); ...
If q = 1, then the q-RDHFHM reduces to the dual hesitant fuzzy Heronian mean operator proposed by Yu et al. [47]. It follows that q − RDHFH Ms,t(d1, d2, ..., dn) = ∪γi∈hi,γj∈hj,ηi∈gi,ηj∈gj nn 1 − ∏∏ 1 − γisγtj ...
applied sciences Article An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control Yuancheng Li 1,*, Pan Zhang 1,2 and Boyan Wang 1 1 School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China; zhangpan-23@126.com...
In [37], the authors revised the local G statistics to allow the variable to be nonpositive and the weight matrix to be nonbinary. There are two versions of the local G statistic, namely Gi(d) and Gi∗(d). The only difference between the two statistics is whether the unit i is ...