搜索结果: 1-15 共查到“transformations”相关记录192条 . 查询时间(0.05 秒)
Combining Different Transformations of Ground Hyperspectral Data with Unmanned Aerial Vehicle (UAV) Images for Anthocyanin Estimation in Tree Peony Leaves
hyperspectral tree peony anthocyanin (Anth) unmanned aerial vehicle (UAV)
2023/11/30
To explore rapid anthocyanin (Anth) detection technology based on remote sensing (RS) in tree peony leaves, we considered 30 species of tree peonies located in Shaanxi Province, China. We used an SVC ...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Linear reciprocal transformations of bihamiltonian integrable hierarchies
双哈密尔顿 可积层次 线性互易变换 流体力学
2023/11/13
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Physically Unclonable Function Machine Learning Modelling Attack
2019/7/15
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong...
EXAMINATION OF SPECTRAL TRANSFORMATIONS ON SPECTRAL MIXTURE ANALYSIS
Spectral Transformation Spectral Mixture Analysis NSMA BWVI Between-class Variance Within-class Variance Total-class Variance
2018/5/11
While many spectral transformation techniques have been applied on spectral mixture analysis (SMA), few study examined their necessity and applicability. This paper focused on exploring the difference...
Faster Homomorphic Linear Transformations in HElib
Homomorphic encryption Implementation Linear transformations
2018/3/9
HElib is a software library that implements homomorphic encryption (HE), with a focus on effective use of "packed" ciphertexts. An important operation (which is used in bootstrapping, as well as in ot...
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations
Side-channel countermeasures masking formal verification
2017/9/14
We describe a technique to formally verify the security of masked implementations against side-channel attacks, based on elementary circuit transformations. We describe two complementary approaches: a...
Oblivious Neural Network Predictions via MiniONN transformations
privacy machine learning neural network predictions
2017/5/25
Machine learning models hosted in a cloud service are increasingly popular but risk privacy: clients sending prediction requests to the service need to disclose potentially sensitive information. In t...
Generic Transformations of Predicate Encodings: Constructions and Applications
Predicate Encryption Attribute-Based Encryption Predicate Encodings
2016/12/7
Predicate encodings are information-theoretic primitives that
can be transformed generically into predicate encryption schemes for a
broad class of predicates (Wee, TCC 2014; Chen, Gay, Wee, EUROCRY...
ANIMATION STRATEGIES FOR SMOOTH TRANSFORMATIONS BETWEEN DISCRETE LODS OF 3D BUILDING MODELS
Building 3D Multiple Representations
2016/7/8
The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advan...
GEODETIC REFERENCE SYSTEM TRANSFORMATIONS OF 3D ARCHIVAL GEOSPATIAL DATA USING A SINGLE SSC TERRASAR-X IMAGE
Photogrammetry Geodesy Mapping Integration Registration Updating Multitemporal SAR
2016/7/5
Many older maps were created using reference coordinate systems which are no longer available, either because no information to a datum was taken in the first place or the reference system is forgotte...
Curve smoothing and transformations in the development of growth curves
Anthropometry body weight body height
2016/5/31
Growth charts such as those published by the
National Center for Health Statistics (NCHS) consist of a set of
smoothed percentile curves showing the distribution of different
aspects of body size f...
In the rich literature of secure multi-party computation (MPC), several important results rely on “protocol transformations,” whereby protocols from one model of MPC are transformed to protocols from ...
Pseudoentropy: Lower-bounds for Chain rules and Transformations
pseudorandomness pseudoentropy lower bounds
2016/2/23
Computational notions of entropy have recently found many applications, including leakageresilient
cryptography, deterministic encryption or memory delegation. The two main types of
results which ma...