نتایج جستجو برای: future state value stream mappingfvsm

تعداد نتایج: 2025088  

Journal: :CoRR 2017
Chih-Yao Ma Min-Hung Chen Zsolt Kira Ghassan Al-Regib

Recent two-stream deep Convolutional Neural Networks (ConvNets) have made significant progress in recognizing human actions in videos. Despite their success, methods extending the basic two-stream ConvNet have not systematically explored possible network architectures to further exploit spatiotemporal dynamics within video sequences. Further, such networks often use different baseline two-strea...

Journal: :IACR Cryptology ePrint Archive 2015
Matthias Hamann Matthias Krause

Most stream ciphers used in practice are vulnerable against generic collision attacks, which allow to compute the secret initial state on the basis of O(2) keystream bits in time and space O(2), where n denotes the inner state length of the underlying keystream generator. This implies the well-known rule that for reaching n-bit security, the inner state length should be at least 2n. Correspondi...

2011
Thomas Bernecker Hans-Peter Kriegel Nikos Mamoulis Matthias Renz Andreas Züfle

This paper introduces a scalable approach for continuous inverse ranking on uncertain streams. An uncertain stream is a stream of object instances with confidences, e.g. observed positions of moving objects derived from a sensor. The confidence value assigned to each instance reflects the likelihood that the instance conforms with the current true object state. The inverse ranking query retriev...

Journal: : 2023

The article proves that under the conditions of full-scale war waged by Russian Federation against Ukraine, significance spiritual and value orientations national state-building became particularly important, since war, first all, is aimed at destruction nation-building values Ukrainian people. By defending our own values, we are, in fact, state sovereignty protecting its identity. guarantee Uk...

1993
Joan Daemen René Govaerts

A recursive attack is presented that is applicable to synchronous stream ciphers consisting of a finite state machine with a linear state-transition function and a multiplexer as output function. A variant of this attack can be used to build a cheap system that bypasses on-line the scrambling of video signals as advised in [1] . 1 The Attacked System The scrambler can be described by a finite s...

2017
Melina A. Kunar Derrick G. Watson Konstantinos Tsetsos Nick Chater

People often have to make decisions based on many pieces of information. Previous work has found that people are able to integrate values presented in a rapid serial visual presentation (RSVP) stream to make informed judgements on the overall stream value (Tsetsos et al. Proceedings of the National Academy of Sciences of the United States of America, 109(24), 9659-9664, 2012). It is also well k...

Forecasting industrial production is essential for efficient planning by managers. Although there are many statistical and mathematical methods for prediction, the use of intelligent algorithms with desirable features has made significant progress in recent years. The current study compared the accuracy of the Artificial Neural Networks (ANN) and Adaptive Nero-Fuzzy Inference System (ANFIS) app...

Journal: :IACR Cryptology ePrint Archive 2015
Frederik Armknecht Vasily Mikhalev

To be resistant against certain time-memory-data-tradeoff (TMDTO) attacks, a common rule of thumb says that the internal state size of a stream cipher should be at least twice the security parameter. As memory gates are usually the most area and power consuming components, this implies a sever limitation with respect to possible lightweight implementations. In this work, we revisit this rule. W...

Journal: :Nonlinear Processes in Geophysics 2022

Abstract. A column model of the Arctic atmosphere is developed including nonlinear positive feedback responses surface albedo and water vapour to temperature. The treated as a grey gas flux longwave radiation governed by two-stream Schwarzschild equations. Water concentration determined Clausius–Clapeyron equation. Representative pathways (RCPs) are used carbon dioxide concentrations into futur...

2008
Robert Rice Douglas J. Cooper

54 www.aiche.org/cep June 2008 CEP Because most processes are self-regulating, it can sometimes be challenging to tune a controller for an integrating process. The principal characteristic of a self-regulating process is that it naturally seeks a steadystate operating level if the controller output and disturbance variables are held constant for a sufficient period of time. For example, a car’s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید