نتایج جستجو برای: leakage parameter
تعداد نتایج: 245023 فیلتر نتایج به سال:
A multilayered neural network is a multi-input, multioutput (MIMO) nonlinear system in which training can be regarded as a nonlinear parameter estimation problem by estimating the network weights. In this paper, the relatively new smooth variable structure filter (SVSF) is used for the training of a nonlinear multilayered feed forward network. The SVSF is a recursive sliding mode parameter and ...
This paper is dedicated to the study of HARQ protocols under a secrecy constraint. An encoder sends information to a legitimate decoder while keeping it secret from the eavesdropper. Our objective is to provide a coding scheme that satisfies both reliability and confidentiality conditions. This problem has been investigated in the literature using a coding scheme that involves a unique secrecy ...
Depletion of abiotic resources is a much disputed impact category in life cycle assessment (LCA). The reason is that the problem can be defined in different ways. Furthermore, within a specified problem definition, many choices can still be made regarding which parameters to include in the characterization model and which data to use. This article gives an overview of the problem definition and...
This paper presents the speech noise reduction system based on frequency domain adaptive line enhancer using the modified DFT (MDFT) pair. The adaptive line enhancer (ALE) is effective to extract sinusoidal signals blurred by broadband noise and utilizes only one microphone; therefore, it is suitable for realization of speech noise reduction in the portable electronic devices. In the ALE, an in...
This study presents improved understanding of sensitivity analysis methods through a comparison of the local sensitivity and two global sensitivity analysis methods: the Morris and Sobol′/Saltelli methods. We re-interpret the variance-based sensitivity indices from the Sobol′/Saltelli method as difference-based measures. It suggests that the difference-based local and Morris methods provide the...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, called“memory attacks”, where an attacker can repeatedly and adaptively learn information about the secret key,subject only to the constraint that the overall amount of such information is bounded by some parameter`. Although the study of such primitives was initiated only recentl...
Based on enhanced interpolation DFT, a novel parameter estimation algorithm for the exponential signal is presented. The proposed two-step solution consists of a preprocessing unit which constructs a new signal sequence by continuously cycle shifting sample points and summing up N buffered exponential signal sample sequences, then an interpolation DFT engine to obtain accurate parameter estimat...
Correlated sources are present in communication systems where protocols ensure that there is some predetermined information for sources. Here correlated sources across an eavesdropped channel that incorporate a heterogeneous encoding scheme and their effect on the information leakage when some channel information and a source have been wiretapped is investigated. The information leakage bounds ...
Abstract In order to solve the problem of low accuracy in oil-gas pipeline leak detection, a detection method based on Particle Swarm Optimization (PSO) algorithm optimized Support Vector Machine (SVM) is introduced. This uses PSO penalty factor ‘c’ and kernel function parameter ‘g’, constructs leakage model SVM. We set up an experimental platform collect negative pressure wave signals under di...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید