نتایج جستجو برای: embedding module
تعداد نتایج: 138395 فیلتر نتایج به سال:
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other
In this paper, we show the role of modules over rings of finite characteristics in data hiding area. Applications of correcting codes and covering functions in data hiding are shown as special cases of our module approach. Applications of modules over rings of characteristic 2 to design new embedding schemes for hiding secret data in binary images are introduced.
let $r$ be a right artinian ring or a perfect commutativering. let $m$ be a noncosingular self-generator $sum$-liftingmodule. then $m$ has a direct decomposition $m=oplus_{iin i} m_i$,where each $m_i$ is noetherian quasi-projective and eachendomorphism ring $end(m_i)$ is local.
In earlier work, Taatgen, Van Rijn and Anderson (in press) have shown that embedding a simple module that generates temporal information in a more general cognitive architecture explains timing phenomena that were earlier attributed to a hypothesized more complex temporal system. However, the embedded temporal module does not support parallel time estimations, of, for example, two concurrent es...
For an embedding of sufficiently high degree of a smooth projective variety X into projective space, we use residues to define a filtered holonomic D-module (M, F) on the dual projective space. This gives a concrete description of the intermediate extension to a Hodge module on P of the variation of Hodge structure on the middle-dimensional cohomology of the hyperplane sections of X . We also e...
In this paper, we present a novel audio watermarking scheme that uses attack characterization to obtain high robustness against standard watermark attacks. The watermark embedding and detection are based on the frequency hopping method in the spectral domain. Perceptual transparency of the algorithm, achieved using frequency masking property of the human auditory system, was con5rmed throughout...
Let k be a commutative ring, A a commutative k-algebra and D the filtered ring of k-linear differential operators of A. We prove that: (1) The graded ring grD admits a canonical embedding θ into the graded dual of the symmetric algebra of the module ΩA/k of differentials of A over k, which has a canonical divided power structure. (2) There is a canonical morphism θ from the divided power algebr...
The Social Book Search (SBS) Lab is part of CLEF 2016 lab series. This is the fourth time that the CYUT CSIE team attends the SBS track. The content of topics has changed a little bit by the organizer; therefore, we make necessary modification on our system, which is based on keyword searching and ranking by social features. This year, we design a query expansion module which is based on word2v...
In this paper, we are focused on a mobile human emotion recognition system which is based on biosignal. Cardio signal is a proper bio-signal for emotion recognition and we use photoplethysmography (PPG) sensors to gather cardio signals. We mainly consider real-time heart rate variability (HRV) analysis which is essential to mobile emotion recognition. A mobile sensor module embedding a digital ...
The notions of quasi-prime submodules and developed Zariski topology was introduced by the present authors in cite{ah10}. In this paper we use these notions to define a scheme. For an $R$-module $M$, let $X:={Qin qSpec(M) mid (Q:_R M)inSpec(R)}$. It is proved that $(X, mathcal{O}_X)$ is a locally ringed space. We study the morphism of locally ringed spaces induced by $R$-homomorphism $Mrightar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید