نتایج جستجو برای: sensitive synthetic schemes side
تعداد نتایج: 715793 فیلتر نتایج به سال:
Fast keypoint recognition is essential to many vision tasks. In contrast to the classification-based approaches [1, 2], we directly formulate the keypoint recognition as an image patch retrieval problem, which enjoys the merit of finding the matched keypoint and its pose simultaneously. A novel convolutional treelets approach is proposed to effectively extract the binary features from the patch...
Locality-sensitive hashing techniques have been developed to efficiently handle nearest neighbor searches and similar pair identification problems for large volumes of high-dimensional data. This study proposes a locality-sensitive hashing method that can be applied to nearest neighbor search problems for data sets containing both numerical and categorical attributes. The proposed method makes ...
امروزه گردآورندگان اطلاعات به ویژه سازمان های آماری با دو مسئله متضاد مواجه اند. از یکسو، بنا به وظیفه قانونی و رشد روزافزون تقاضا برای اطلاعات جمعآوری شده، خود را متعهد به انتشار هر چه گسترده تر و باکیفیت تر اطلاعات به شکل داده های آماری می بینند و از سوی دیگر با توجه به نگرانی عمومی نسبت به افشا اطلاعات شخصی و وظیفه قانونی این سازمانها برای مراقبت از اطلاعات خصوصی پاسخگویان، باید این تضمین را...
This document discusses masking approaches with a special focus on the AES S-box. Firstly, we discuss previously presented masking schemes with respect to their security and implementation. We conclude that algorithmic countermeasures to secure the AES algorithm against side-channel attacks have not been resistant against all first-order side-channel attacks. In this article, we introduce a new...
BACKGROUND The development of synthetic taxanes targets at increasing solubility of the drug, improved clinical efficacy and reduced side-effects. We evaluated the sensitivity of head and neck squamous cell carcinoma cell lines to BMS-184476 and BMS-188797 in vitro. MATERIALS AND METHODS The effects of paclitaxel and the synthetic taxanes were tested on six recently established cell lines (3 ...
Data privacy is one of the main concerns for clients who rely on cloud storage services. Standard encryption techniques can offer confidentiality; however, they prevent search capabilities over the encrypted data, thereby significantly degrading the utilization of cloud storage services. Public key Encryption with Keyword Search (PEKS) schemes offer encrypted search functionality to mitigate th...
In this paper the parallel connection of two three-phase buck-type unity power factor rectifier systems is investigated experimentally for a 10kW DSP-controlled prototype. There, a space vector modulation scheme is employed which shows all advantages of interleaved operation of the two systems. Three control schemes for active DC-side current balancing are described. The control schemes do diff...
In this paper the active DC side current balancing of parallel connected three-phase buck-type rectifier systems is investigated using space vector calculus. Modulation schemes for the parallel connection are derived from the switching state sequences known for a single system and are comparatively evaluated by digital simulation. The independent current AC and DC side current paths are shown a...
internal turn-turn faults (ttf) are the most common failures in power transformers, which could seriously reduce their life expectancy. although common protection schemes such as current-baseddifferential protection are able to detect some of the internal faults, some other minor ones (such as ttfs andshort circuit near the neutral point) cannot be detected by such schemes. likewise, these rela...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید