نتایج جستجو برای: identification scheme
تعداد نتایج: 625502 فیلتر نتایج به سال:
We propose four different identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more secure than any known pairing-based identification scheme.
In this paper, we analyse the asymptotic property of the optimal quantization of signals used for system identification in high resolution case. We show an optimal quantization scheme for minimizing estimation errors under a constraint on the number of subsections of the quantized signals or the expectation of the optimal code length. The optimal quantization schemes can be given by solving Eul...
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identification schemes.
In this paper, we present gradient expressions for a closed-loop parametric identification scheme. The method is based on the minimization of a standard identification criterion and a parametrization that is tailored to the closed-loop configuration. It is shown that for both linear and nonlinear plants and controllers, the gradient signals can be computed exactly. 1999 Elsevier Science Ltd. Al...
When a control chart shows an out-of-control condition, a search begins to identify and eliminate the root cause(s) of the process disturbance. The time when the disturbance has manifested itself to the process is referred to as change point. Identification of the change point is considered as an essential step in analyzing and eliminating the disturbance source(s) effectively. When a process...
A Preisach model able to adjust to different systems with hysteresis is presented. The related identification scheme involved uses data from a major hysteresis curve and a least-squares error minimization procedure for the parameters of the characteristic density. The output sequence, f ðtÞ; is obtained by integrating the characteristic probability density function, rða;bÞ; of the elementary hy...
Recent research has shown that using public-key cryptography for RFID tags is not only necessary in order to meet privacy requirements, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification. This protocol ensures that the identity of a tag only becomes known to the intended reader, and not to any eavesdropping party. I...
Romanized script is popular today for communication in every country, as the script is almost universally enabled in text processors. In countries like India which is a linguistic cauldron, it is very common to see English text in email messages and chat transcripts, with generous sprinkling of words from local languages in roman script. Dubbed as Manglish (Malayalam and English) etc., this rom...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید