نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...

Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

Journal: :Computers & Graphics 2009
Ruotian Ling Xiaonan Luo Zhongxian Chen

This paper presents an interpolating ternary butterfly subdivision scheme for triangular meshes based on a 1-9 splitting operator. The regular rules are derived from a C2 interpolating subdivision curve, and the irregular rules are established through the Fourier analysis of the regular case. By analyzing the eigen-structures and characteristic maps, we show that the subdivision surfaces genera...

2017
Yohan Penel YOHAN PENEL

We derive in this paper a numerical scheme in order to calculate solutions of 1D transport equations. This 2nd-order scheme is based on the method of characteristics and consists of two steps: The first step is about the approximation of the foot of the characteristic curve whereas the second one deals with the computation of the solution at this point. The main idea in our scheme is to combine...

1989
D. J. Zarkadis Barry G. Evans

The LPC-type speech coders require efficient quantization and coding of the LPC spectral parameters in order to operate at low bit-rates. We present here results from an investigation to the Vector Predictive Quantization (VPQ) approach for the compression of the LPC spectral information. Reduction of the computation requirements of the VPQ scheme by means of Split-Vector Quantization is consid...

Journal: :I. J. Network Security 2015
Bin Feng Cheng Guo Mingchu Li Zhi-Hui Wang

A proactive secret sharing scheme is a method of sharing a secret among a set of participants. And, the corresponding shadows can be periodically renewed under the premise of never changing the shared secret. However, in the most existing proactive secret sharing schemes, only one secret can be shared during one secret sharing process. The proposed scheme describes PMSS, a new way to share mult...

Journal: :علوم کاربردی و محاسباتی در مکانیک 0
صالح عباسی مود مجید ملک جعفریان

present paper investigates the numerical solution of two-dimensional unsteady compressible navier-stokes equations by a new scheme based on the finite volume method. kinetic energy preserving (kep) scheme is introduced for solving the supersonic and transonic external compressible flow field on very fine grids (with a number of cells of the order of the reynolds number) without artificial dissi...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

1999
Neville J. Ford

We present results on the approximation of the characteristic values of a delay diierential equation through the calculation of characteristic values of a corresponding discrete scheme constructed through the use of a strongly stable linear multistep method. Our tool in the analysis is the boundary locus method and we give a theorem that guarantees that the roots of the characteristic equation ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید