نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

A. Cheraghi

In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...

2009
Dongfang Chen Bing Zhou

This paper presents an oblivious watermarking scheme based on contourlet transform and quantization index modulus modulation (QIMM).The scheme has the following features. First, the proposed scheme makes better use of multidirectional characteristic of contourlet transform and embed the watermark into the 4 directional high pass sub bands. Second, the scheme avoids the problem of selection of w...

2002
Der-Jenq Liu Chin-Teng Lin

A new technique is proposed to estimate the robust continuous observation densities of hidden Markov model (HMM) for improving the performance of speaker-independent (SI) automatic speech recognition system. First, a scheme of generalized common vector (GCV), which originated from the common vector approach (CVA), is proposed. The objective of this scheme is to extract a robust speech feature o...

2000
DAN JIAO JIAN-MING JIN

The characteristic-based finite-volume time-domain method is applied to analyze the scattering from conducting objects coated with lossy dielectric materials. Based on the characteristic-based finite-volume scheme, two numerical strategies are developed to model the electromagnetic propagation across different dielectric media. One introduces a connecting boundary to separate the total-field re...

Journal: :SIAM J. Scientific Computing 2010
Daniel R. Reynolds Ravi Samtaney Carol S. Woodward

We introduce an operator-based scheme for preconditioning stiff components encountered in implicit methods for hyperbolic systems of PDEs posed on regular grids. The method is based on a directional splitting of the implicit operator, followed by a characteristic decomposition of the resulting directional parts. This approach allows for the solution of any number of characteristic components, f...

Journal: :journal of computer and robotics 0

mobile computing systems are made up of different components among which mobile support stations (msss) play a key role. this paper proposes an efficient mss-based non-blocking coordinated checkpointing scheme for mobile computing environment. in the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the msss and as a result the workload of mobile ...

Journal: :International Journal of Asian Education 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید