搜索结果: 1-15 共查到“知识库 transformations”相关记录188条 . 查询时间(0.109 秒)
Combining Different Transformations of Ground Hyperspectral Data with Unmanned Aerial Vehicle (UAV) Images for Anthocyanin Estimation in Tree Peony Leaves
hyperspectral tree peony anthocyanin (Anth) unmanned aerial vehicle (UAV)
2023/11/30
To explore rapid anthocyanin (Anth) detection technology based on remote sensing (RS) in tree peony leaves, we considered 30 species of tree peonies located in Shaanxi Province, China. We used an SVC ...
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Physically Unclonable Function Machine Learning Modelling Attack
2019/7/15
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong...
EXAMINATION OF SPECTRAL TRANSFORMATIONS ON SPECTRAL MIXTURE ANALYSIS
Spectral Transformation Spectral Mixture Analysis NSMA BWVI Between-class Variance Within-class Variance Total-class Variance
2018/5/11
While many spectral transformation techniques have been applied on spectral mixture analysis (SMA), few study examined their necessity and applicability. This paper focused on exploring the difference...
Faster Homomorphic Linear Transformations in HElib
Homomorphic encryption Implementation Linear transformations
2018/3/9
HElib is a software library that implements homomorphic encryption (HE), with a focus on effective use of "packed" ciphertexts. An important operation (which is used in bootstrapping, as well as in ot...
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations
Side-channel countermeasures masking formal verification
2017/9/14
We describe a technique to formally verify the security of masked implementations against side-channel attacks, based on elementary circuit transformations. We describe two complementary approaches: a...
Oblivious Neural Network Predictions via MiniONN transformations
privacy machine learning neural network predictions
2017/5/25
Machine learning models hosted in a cloud service are increasingly popular but risk privacy: clients sending prediction requests to the service need to disclose potentially sensitive information. In t...
Generic Transformations of Predicate Encodings: Constructions and Applications
Predicate Encryption Attribute-Based Encryption Predicate Encodings
2016/12/7
Predicate encodings are information-theoretic primitives that
can be transformed generically into predicate encryption schemes for a
broad class of predicates (Wee, TCC 2014; Chen, Gay, Wee, EUROCRY...
ANIMATION STRATEGIES FOR SMOOTH TRANSFORMATIONS BETWEEN DISCRETE LODS OF 3D BUILDING MODELS
Building 3D Multiple Representations
2016/7/8
The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advan...
GEODETIC REFERENCE SYSTEM TRANSFORMATIONS OF 3D ARCHIVAL GEOSPATIAL DATA USING A SINGLE SSC TERRASAR-X IMAGE
Photogrammetry Geodesy Mapping Integration Registration Updating Multitemporal SAR
2016/7/5
Many older maps were created using reference coordinate systems which are no longer available, either because no information to a datum was taken in the first place or the reference system is forgotte...
Curve smoothing and transformations in the development of growth curves
Anthropometry body weight body height
2016/5/31
Growth charts such as those published by the
National Center for Health Statistics (NCHS) consist of a set of
smoothed percentile curves showing the distribution of different
aspects of body size f...
In the rich literature of secure multi-party computation (MPC), several important results rely on “protocol transformations,” whereby protocols from one model of MPC are transformed to protocols from ...
Pseudoentropy: Lower-bounds for Chain rules and Transformations
pseudorandomness pseudoentropy lower bounds
2016/2/23
Computational notions of entropy have recently found many applications, including leakageresilient
cryptography, deterministic encryption or memory delegation. The two main types of
results which ma...
Changes in Accounting Solutions for Transformations of Business Companies and Cooperatives since the Beginning of 2012
Balance sheet date for measurement Accounting methods for transformations in Czech law Acquisition
2016/1/27
It can be concluded from an analysis and comparison of the legal and accounting concepts related to the amendment of the Transformation of Business Companies and Cooperatives Act and Regulation 500, t...
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
bilinear maps composite-order groups Groth-Sahai proofs
2016/1/9
At Eurocrypt 2010, Freeman presented a framework to convert cryptosystems based on compositeorder
groups into ones that use prime-order groups. Such a transformation is interesting not only from
a c...
DATA FUSION USING IHS TRANSFORMATIONS FOR EXPLORING ORE DEPOSITS IN NORTHEASTERN PART OF THE SAHARAN METACRATON
Data Fusion IHS Transformations Landsat TM RADARSAT-1 Saharan Metacraton
2015/12/31
The main objective of the remotely sensed data fusion is to create an integrated composite image of improved information and enhanced interpretability. This data have geospatial details about earth’s ...