نتایج جستجو برای: identification scheme

تعداد نتایج: 625502  

1999
Lars R. Knudsen Willi Meier

This paper describes an attack on an identification scheme based on the permuted perceptron problem (PPP) as suggested by Pointcheval. The attack finds the secret key, a vector of n binary elements, in time much faster than estimated by its designer. The basic idea in the attack is to use several applications of a simulated annealing algorithm and combine the outcomes into an improved search. I...

2013
Wen Yang Hui Song Gui-Song Xia Xin Xu

This paper introduces a simple but effective scattering mechanism identification scheme for analyzing mixed scattering mechanisms obtained by model-based decomposition. Using the normalized scattering vector, each pixel is represented by a point in a standard 2-simplex in R. Seven scattering category centers are represented by the three vertices, the three midpoints of sides and the centroid of...

Journal: :CoRR 2013
Henrik Ohlsson Lillian J. Ratliff Roy Dong S. Shankar Sastry

Blind system identification is known to be an ill-posed problem and without further assumptions, no unique solution is at hand. In this contribution, we are concerned with the task of identifying an ARX model from only output measurements. We phrase this as a constrained rank minimization problem and present a relaxed convex formulation to approximate its solution. To make the problem well pose...

2001
Stanislav S. MAKHANOV Edmond J. VANDERPERRE

We present a new blur identification procedure based on a hybrid, two-level evolutionary-deterministic scheme which allows dynamic optimization of the size and the pattern of the support of the point spread function. We demonstrate that the proposed techniques can be generalized to the case of multi-band identification. Numerical simulations demonstrate the overall priority of the proposed iden...

2009
Irfan Ahmed Kyung-suk Lhee Hyunjung Shin Manpyo Hong

Types of files (text, executables, Jpeg images, etc.) can be identified through file extension, magic number, or other header information in the file. However, they are easy to be tampered or corrupted so cannot be trusted as secure ways to identify file types.In the presence of adversaries, analyzing the file content may be a more reliable way to identify file types, but existing approaches of...

2003
Gang Yao Guilin Wang Yong Wang

M. Kim and K. Kim [1] introduce a new identification scheme based on the Gap Diffie-Hellman problem, and prove that the scheme is secure against active attacks if the Gap Diffie-Hellman problem is intractable. But, their identification scheme is NOT secure. In this paper, we give the reason that why the scheme is not secure, and we also modify the scheme such that the modified scheme is secure ...

2013
Nicolas Sendrier Dimitris E. Simos

The code equivalence problem is to decide whether two linear codes over Fq are identical up to a linear isometry of the Hamming space. In this paper, we review the hardness of code equivalence over Fq due to some recent negative results and argue on the possible implications in code-based cryptography. In particular, we present an improved version of the three-pass identification scheme of Gira...

2004
J. M. Dulieu-Barton

This paper describes a coherent strategy for intelligent fault detection. All of the features of the strategy are discussed in detail. These encompass: (i) a taxonomy for the relevant concepts, i.e. a precise definition of what constitutes a fault etc., (ii) a specification for operational evaluation which makes use of a hierarchical damage identification scheme, (iii) an approach to sensor pre...

2002
U. Bach T. P. Krichbaum E. Ros S. Britzen A. Witzel J. A. Zensus

We present an analysis of new and old high frequency VLBI data collected during the last 10 years at 5– 22 GHz. For the jet components in the mas-VLBI jet, two component identifications are possible. One of them with quasi-stationary components oscillating about their mean positions. Another identification scheme, which formally gives the better expansion fit, yields motion with ∼ 9 c for H0 = ...

Journal: :IEEE Trans. Contr. Sys. Techn. 1998
Yangquan Chen Changyun Wen Jian-Xin Xu Mingxuan Sun

Extracting projectile’s optimal fitting drag coefficient curve Cdf from radar measured velocity data is considered as an optimal tracking control problem (OTCP) where Cdf is regarded as a virtual control function while the radar measured velocity data are taken as the desired output trajectory to be optimally tracked. With a three-degree of freedom (DOF) point mass trajectory prediction model, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید