نتایج جستجو برای: identification scheme
تعداد نتایج: 625502 فیلتر نتایج به سال:
Fingerprint is one of the most important biometric techniques for identification and authentication, which may also reduce the complexity (cost / time) of searching data in large database. Over the past several years various methods have been proposed for fingerprint identification, on the same way, this paper propose a new efficient method for fingerprint identification based on ridge and vall...
abstract background and objective: a high level of homogeneity observed within all bacteria in the mycobacterium tuberculosis complex makes a property that seriously challenges traditional biochemical-based identification methods of these pathogens in the laboratory. the work presented here was conducted to characterize mycobacterium tuberculosis complex isolates in golestan, northern iran. mat...
Hot data identification can be applied to a variety of fields. Particularly in flash memory, it has a critical impact on its performance (due to garbage collection) as well as its lifespan (due to wear leveling). Although this is an issue of paramount importance in flash memory, it is the least investigated one. Moreover, all existing schemes focus only or mainly on a frequency viewpoint. Howev...
The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently proposed by Cayrel et al. in [14]. Our proposed scheme benefits of a performance gain as a result of the reductio...
Star identification is one of the most important stages in attitude determination with star trackers. This can be performed using matching algorithms between observed stars and a master star catalogue. The main challenge in this approach is to provide a fast and reliable identification algorithm that is sufficiently robust in different pointing views of the star tracker optical system in the sp...
This paper presents an adaptive position control scheme for DC motors based on an on-line closed loop continuous-time identification method. A fast, non-asymptotic, algebraic identification method is used to estimate simultaneously the unknown system parameters and the unmeasured states to update an adaptive position control scheme.
Identification of nonfermenting Gram-negative bacteria (NFGNB) of cystic fibrosis patients is hard and misidentification could affect clinical outcome. This study aimed to propose a scheme using polymerase chain reaction to identify NFGNB. This scheme leads to reliable identification within 3 days in an economically viable manner when compared to other methods.
This paper presents a system for the identification of vocal and vocal-like sounds by means of a classificatory scheme based upon their prosodic attributes. The system firstly segments examples of the sound classes in question and performs a number of analyses on these segments in order to determine their prosodic attributes. Then, it builds a classificatory scheme, which will be used to identi...
In a previous class (Lecture 25), we showed how to construct an identification scheme which is secure against a passive adversary using an Honest-Verifier Zero-Knowledge Proof of Knowledge (HVZK-PoK). We also showed that it is possible to construct an Identification Scheme secure against an active adversary using a Witness Indistinguishable Proof of Knowledge (WI-PoK). In this lecture, we will ...
Power system stabilizers have been widely used and successfully implemented for the improvement of power system damping. However, a fixed parameter power system stabilizer tends to be sensitive to variations in generator dynamics so that, for operating conditions away from those used for design, the effectiveness of the stabilizer can be greatly impaired. With the advent of microprocessor techn...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید