نتایج جستجو برای: pseudo subspace
تعداد نتایج: 66922 فیلتر نتایج به سال:
Abstract. Grøstl is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we use many techniques to improve the pseudo preimage attack on Grøstl hash function, such as subspace preimage attack and guess-and-determine technique. We present improved pseudo preimage attacks on 5-round Grøstl-256 and 8-round Grøstl-512 respectively. The complexity of the a...
The performance of a single weak classifier can be improved by using combining techniques such as bagging, boosting and the random subspace method. When applying them to linear discriminant analysis, it appears that they are useful in different situations. Their performance is strongly affected by the choice of the base classifier and the training sample size. As well, their usefulness depends ...
We study Riemannian or pseudo-Riemannian manifolds which carry the space of closed conformal vector fields of at least 2-dimension. Subject to the condition that at each point the set of closed conformal vector fields spans a non-degenerate subspace of the tangent space at the point, we prove a global and a local classification theorems for such manifolds.
The ADI iteration is closely related to the rational Krylov projection methods for constructing low rank approximations to the solution of Sylvester equation. In this paper we show that the ADI and rational Krylov approximations are in fact equivalent when a special choice of shifts are employed in both methods. We will call these shifts pseudo H2-optimal shifts. These shifts are also optimal i...
The ADI iteration is closely related to the rational Krylov projection methods for constructing low rank approximations to the solution of Sylvester equation. In this paper we show that the ADI and rational Krylov approximations are in fact equivalent when a special choice of shifts are employed in both methods. We will call these shifts pseudo H2-optimal shifts. These shifts are also optimal i...
Given an uncountable cardinal א, the product space I, I = [0, 1], is called a Tychonoff cube. A collection of closed subsets of a subspace Y of a Tychonoff cube I that covers Y determines a weak topology for Y . The collection of compact subsets of I that have a countable dense subset covers I. It is known from work of the author and I. Ivanšić that the weak topology generated by this collectio...
In this work, we propose a multi-modal method that combines the scores of selected fingerprint matchers with the scores obtained by a Face Authenticator where the facial features are combined with pseudo-random numbers. We propose a novel method to combine the scores of fingerprint matchers based on random subspace Ensemble and we test the method on the systems submitted to FVC2004. Moreover, w...
A sequence ${T_n}_{n=1}^{infty}$ of bounded linear operators on a separable infinite dimensional Hilbert space $mathcal{H}$ is called subspace-diskcyclic with respect to the closed subspace $Msubseteq mathcal{H},$ if there exists a vector $xin mathcal{H}$ such that the disk-scaled orbit ${alpha T_n x: nin mathbb{N}, alpha inmathbb{C}, | alpha | leq 1}cap M$ is dense in $M$. The goal of t...
Introduction: In the recent decade, there have been significant efforts in developing multiuser detection technologies to alleviate the effect of multiple access interference (MAI) in codedivision multiple-access (CDMA) systems. Blind multiuser detection is of special interest for MAI mitigation in CDMA systems since it is impractical to assume perfect knowledge of parameters such as spreading ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید