نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

Journal: :computational methods for differential equations 0
mohammad reza niknam department of mathematics, payame noor university, p.o.box 19395-3697, tehran, iran aghileh heydari department of mathematics, payame noor university, p.o.box 19395-3697, tehran, iran

in this paper, a finite-time control scheme is presented for stabilization ofthe satellite chaotic attitude around its equilibrium point whenits attitude is confused by a disturbed torque. controllers and settling timeof stabilizaton are obtained, based on the lyapunov stability theoremand finite-time control scheme. this method is satisfied for any initial condition.numerical simulations are ...

2015
Jinho Kim Geon Park Jul-Ki Seok Byongjun Lee Yong Cheol Kang

Because wind generators (WGs) in a wind power plant (WPP) produce different active powers due to wake effects, the reactive power capability of each WG is different. This paper proposes a hierarchical voltage control scheme for a WPP that uses a WPP controller and WG controller. In the proposed scheme, the WPP controller determines a voltage error signal by using a PI controller and sends it to...

Journal: :Journal of The Korea Internet of Things Society 2016

Journal: :Journal of Physics: Conference Series 2021

Abstract Hybrid Boundary Value Method (HyBVM) is a new scheme, which based on Linear Multistep (LMM). The HyBVM the hybrid version of Methods (BVMs) are methods derived to overcome limitations LMMs. This scheme shares same characteristic with Runge Kutta method as data utilized at off-step points. In this work, we apply two second order Problems (BVPs) mixed boundary conditions and results effi...

Gholam Reza Kiany, Monireh Norouzi,

Performance assessment is exceedingly considered a key concept in teacher education programs worldwide. Accordingly, in Iran, a national assessment system was proposed by Farhangian University to assess the professional competencies of its ELT graduates. The concerns regarding the validity and authenticity of traditional measures of teachers' competencies have motivated us to devise a localized...

2005
Guorong Xuan Yun Q. Shi Jianjiong Gao Dekun Zou Chengyun Yang Zhenping Zhang Peiqi Chai Chunhua Chen Wen Chen

In this paper , a steganalysis scheme based on multiple features formed by statistical moments of wavelet characteristic functions is proposed. Our theoretical analysis has pointed out that the defined n-th statistical moment of a wavelet characteristic function is related to the n-th derivative of the corresponding wavelet histogram, and hence is sensitive to data embedding. The selection of t...

2007
S.-C. Lo G. A. Blaisdell A. S. Lyrintzis

The goal of this work is to investigate methods for simulating turbulent supersonic flows that include shock waves. Several different types of previously proposed characteristic filters, including total variation diminishing (TVD), monotone upstream-centered scheme for conservation laws (MUSCL), and weighted essentially non-oscillatory (WENO) filters, are investigated in this study. Similar to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید