نتایج جستجو برای: wise foundations authentication
تعداد نتایج: 90938 فیلتر نتایج به سال:
In this paper, an efficient watermarking scheme for image tampering detection and recovery is proposed. Using the mechanism of image segmentation, an image is partitioned into irregular and interrelated regions, with the purpose of removing the block-wise independence to resist VQ attack. For each region, the pixels are fed into a feedback-based chaotic system to produce the authentication wate...
A genome scan was used to detect chromosomal regions and QTL that control quantitative traits of economic importance in chickens. Two unique F(2) crosses generated from a commercial broiler male line and 2 genetically distinct inbred lines (Leghorn and Fayoumi) were used to identify QTL affecting BW and daily average gain traits in chickens. Body weight at 2, 4, 6, and 8 wk was measured in the ...
Agent-based computational models represent a big challenge in many disciplines. A vital approach receiving much interest is agent-based models, which gives a new area providing some ways to tackle some of the restrictions of the analytical models in finance. The aim of our research is to contribute to the behavioral finance and agent-based artificial markets by studying their market-wise implic...
We analyze the space complexity of monitoring streams of messages whose expected behavior is specified in a fragment of predicate logic; this fragment is the core of the LogicGuard specification language that has been developed in an industrial context for the runtime monitoring of network traffic. The execution of the monitors is defined by an operational semantics for the step-wise evaluation...
In discrete-time digital models of contact of vibrating objects stability and therefore control over system energy is an important issue. While numerical approximation is problematic in this context digital algorithms may meat this challenge when based on exact mathematical solution of the underlying equation. The latter may generally be possible under certain conditions of linearity. While a s...
In this paper, a combined shape-texture approach to discriminative face authentication is studied. Facial texture information is captured through Gabor responses (jets), similarly to the Elastic Bunch Graph Matching approach, but the points where filters are applied are located over lines that sketch the face. In this way, textural information is “shape-driven” and unlike other Gabor-based appr...
When earthquakes strike the city it results in great loss of lives. The present paper talks about a new innovative design system (MegEifel) for buildings which has a mechanism to mitigate deaths in case any earthquake strikes the city. If buildings will be designed according to MegEifel design then the occupants of the building will be safe even when they are in sleep or are doing day wise acti...
In this paper, we first designed Huffman code (HC)-based absolute moment block truncation coding (AMBTC). Then, applied (AMBTC) to design a pixel pair-wise fragile image watermarking method. Pixel tampering detection and content recovery mechanisms were collaboratively in the proposed scheme enhance readability even when images have been tampered with. Representative features are derived from o...
This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these areas fall into one of two categories: efficient solutions lacking formal proofs of security or provably-secure, but highly inefficient solutions. This work will bridge this gap...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید