نتایج جستجو برای: such as homomorphic deconvolution

تعداد نتایج: 5967123  

ژورنال: دریا فنون 2019

Abstract: Image restoration is a critical step in many vision applications. Due to the poor quality of Passive Millimeter Wave (PMMW) images, especially in marine and underwater environment, developing strong algorithms for the restoration of these images is of primary importance. In addition, little information about image degradation process, which is referred to as Point Spread Function (PSF...

Let (G;N) be a pair of groups. In this article, first we con-struct a relative central extension for the pair (G;N) such that specialtypes of covering pair of (G;N) are homomorphic image of it. Second, weshow that every perfect pair admits at least one covering pair. Finally,among extending some properties of perfect groups to perfect pairs, wecharacterize covering pairs of a perfect pair (G;N)...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2015
Robert Frederick

It turned out to be pretty easy for Yaniv Erlich to identify people who had donated their genomic data to science, even despite researchers’ attempts to make that data anonymous. Erlich, a former computer hacker hired by businesses to test the security of computer systems, only needed his tailor-made computer program and an Internet connection to access publicly available databases. Erlich, tho...

2004
Franklin Sedarat Eric Lin Edwin D.W. Moore Glen F. Tibbits Edwin D. W. Moore

Sedarat, Franklin, Eric Lin, Edwin D. W. Moore, and Glen F. Tibbits. Deconvolution of confocal images of dihydropyridine and ryanodine receptors in developing cardiomyocytes. J Appl Physiol 97: 1098 –1103, 2004. First published April 2, 2004; 10.1152/ japplphysiol.00089.2004.—Colocalization of dihydropyridine (DHPR) and ryanodine (RyR) receptors, a key determinant of Ca induced Ca release, was ...

Journal: :JCM 2016
Chun-Hui Wu Qin Li Zhiwei Sun Xueling Zhong

—Chameleon hash functions are trapdoor one-way functions with many applications such as chameleon signatures and on-line/off-line signatures. Previous research focused on the concrete constructions based on different assumptions, as well as schemes without the key-exposure problem. In this paper, we consider the structure-preserving schemes where messages, hash value and public keys all consis...

Journal: :Journal of biomedical informatics 2014
Joppe W. Bos Kristin E. Lauter Michael Naehrig

Increasingly, confidential medical records are being stored in data centers hosted by hospitals or large companies. As sophisticated algorithms for predictive analysis on medical data continue to be developed, it is likely that, in the future, more and more computation will be done on private patient data. While encryption provides a tool for assuring the privacy of medical information, it limi...

2010
Ron Rothblum Oded Goldreich

In this thesis we study two remotely related cryptographic primitives: homomorphic encryption and enhanced trapdoor permutations. Our main result regarding homomorphic encryption shows that any private-key encryption scheme that is weakly homomorphic with respect to addition modulo 2, can be transformed into a public-key encryption scheme. The homomorphic feature referred to is a minimalistic o...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

run-out-table (rot) is located between last finishing stand and down coiler in a hot strip mill. as the hot steel strip passes from rot, water jets impact on it from top and bottom and strip temperature decreases approximately from 800-950 °c to 500-750°c. the temperature history that strip experience while passing through rot affects significantly the metallurgical and mechanical properties, s...

Journal: :Des. Codes Cryptography 2011
Nigel P. Smart Frederik Vercauteren

At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations. The slow key generation process of the Smart–Vercauteren system was then addressed in a paper by Gentry and Halevi, but their key generation method appears to exclude the SIMD style operation alluded to by Smart and V...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

in the new age, in regard to human success in education in the globalizing world, one can consider english proficiency and individual differences as two important issues. in efl settings, reading skill plays an important role in education. it seems that using multiple intelligences theory in efl classes which values individual differences by tapping different intelligences, can be rewarding. as...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید