نتایج جستجو برای: sensitive synthetic schemes zero

تعداد نتایج: 657628  

2008
Huajian Liu

ii tampering detection is enabled in the authentication process by presetting the noise filter size. Second, we study the unique characteristics of synthetic images and develop a novel watermarking scheme for synthetic image authentication. The proposed watermarking algorithm is fully compatible with the characteristics of synthetic images. With less pixels modified, the authentication system c...

2000
Stefan Will Lothar Hermes Joachim M. Buhmann Jan Puzicha

Texture is an inherently non–local image property. All common texture descriptors, therefore, have a significant spatial support which renders classical edge detection schemes inadequate for the detection of texture boundaries. In this paper we propose a novel scheme to learn filters for texture edge detection. Textures are defined by the statistical distribution of Gabor filter responses. Opti...

2005
Persefoni Kyritsi George Papanicolaou Chrysoula Tsogka

Assuming perfect channel knowledge at the transmitter, we propose optimal pre-equalization filters (spatial and temporal) that expand on the conventional Time Reversal (TR) and Zero Forcing (ZF) schemes. The filters are designed to minimize Inter Symbol Interference (ISI) and maximize the received power at the intended receiver. The different schemes are compared in terms of bit error rate and ...

2006
J. T. STAFFORD

In an earlier paper [KRS] we defined and investigated the properties of the na¨ıve blowup of an integral projective scheme X at a single closed point. In this paper we extend those results to the case when one na¨ıvely blows up X at any suitably generic zero-dimensional subscheme Z. The resulting algebra A has a number of curious properties; for example it is noetherian but never strongly noeth...

2015
Yin Tan Guang Gong

Zero-difference balanced (ZDB) functions were introduced by Ding for the constructions of optimal and perfect systems of sets and of optimal constant composition codes. In order to be used in these two areas of application, ZDB functions have to be defined on cyclic groups. In this paper, we investigate quadratic ZDB functions from the additive group of Fpn to itself of the form G(x t+1), where...

2007
Chae Hoon Lim Pil Joong Lee

In this note we consider the problem of signature forgery by the signer in digital signature schemes based on the zero-knowledge concept and propose a simple method for obtaining security against such forgery without any increase of computation complexity.

2005

In [8], Herzog and Srinivasan study the relationship between the graded Betti numbers of a homogeneous ideal I in a polynomial ring R and the degree of I. For certain classes of ideals, they prove a bound on the degree in terms of the largest and smallest Betti numbers, generalizing results of Huneke and Miller in [9]. The bound is conjectured to hold in general; we study this using linkage. If...

This paper contains a strain gradient theory to capture size effects in rotating nanodisks of variable thickness under thermal and mechanical loading. Material properties of nanodisks have been taken homogeneous material. The strain gradient theory and the Hamilton’s principle are employed to derive the governing equations. Due to complexity of the governing differential equation and boundary c...

Journal: :Revista Brasileira de Recursos Hídricos 2023

ABSTRACT Water quality models are often applied to support the definitions for water resources planning and management. This process requires appropriate data calibrate make required verification validation analysis. However, in some case studies, there is not enough run a complex model whatever system, being river or reservoir. In context of scarce data, search simple an alternative comprehend...

Journal: :The American Statistician 2022

When releasing record-level data containing sensitive information to the public, disseminator is responsible for protecting privacy of every record in dataset, simultaneously preserving important features users’ analyses. These goals can be achieved by synthesis, where confidential are replaced with synthetic that simulated based on statistical models estimated data. In this article, we present...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید