نتایج جستجو برای: key block method
تعداد نتایج: 2235566 فیلتر نتایج به سال:
.
BACKGROUND Statistical inference of signals is key to understand fundamental processes in the neurosciences. It is essential to distinguish true from random effects. To this end, statistical concepts of confidence intervals, significance levels and hypothesis tests are employed. Bootstrap-based approaches complement the analytical approaches, replacing the latter whenever these are not possible...
This paper introduces a block based motion estimation algorithm based on projection with adaptive window size selection. The blocks cannot match well if their corresponding 1D projection does not match well, with this as foundation 2D block matching problem is translated to a simpler 1D matching, which eliminates majority of potential pixel participation. This projection method is combined with...
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher. We relate the security of the elastic version of a block cipher to the fixed-length version by forming a reduction between the versions. Our method is independent of the specific block c...
Recently, Guo and Lin [SIAM J. Matrix Anal. Appl., 31 (2010), 2784–2801] proposed an efficient numerical method to solve the palindromic quadratic eigenvalue problem (PQEP) . 2ATC QCA/ ́ D 0 arising from the vibration analysis of high speed trains, where A; Q 2 C n have special structures: both Q and A are, among others, m m block matrices with each block being k k (thus, n D mk), and moreover, ...
In OFDM systems, residual inter-block interference can be suppressed by a time-domain equalizer that blindly shortens the effective length of a channel impulse response. To further improve the performance of blind equalizers, we propose a channel shortening method that attempts to maximize the minimum FFT output power over data subcarriers. Simulation results indicate that the max-min strategy ...
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application indistinguishability obfuscation methods selected private crypto-systems. applied symmetric crypto-system and target system asymmetric one. As an input for our approach implementation block cipher with a given private-key considered. Different subjected processing. would be treat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید