搜索结果: 1-15 共查到“h-transform”相关记录297条 . 查询时间(0.14 秒)
AI could transform social science research(图)
Artificial Intelligence Penn Integrates Knowledge Professors Research
2023/6/27
南京农业大学农学院《IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE》发表甘祥超教授团队“An integrated fast Hough transform for multidimensional data”(图)
甘祥超 高维数据 计算机图像
2023/10/28
2023年5月4日,南京农业大学农学院及前沿交叉研究院甘祥超教授团队在TPAMI (IEEE Transactions on Pattern Analysis and Machine Intelligence, IF=24.314)上发表题为“An integrated fast Hough transform for multidimensional data”的研究论文(https://doi...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Covariant Riesz transform on differential forms for $p\in (1,2]$
$pin (1,2]$ 微分形式 协变里斯变换
2023/4/28
西安电子科技大学数字信号处理英文课件Chapter5 The Discrete Fourier Transform
西安电子科技大学 数字信号处理 英文课件 Chapter5 Discrete Fourier Transform
2020/6/22
西安电子科技大学数字信号处理英文课件Chapter5 The Discrete Fourier Transform。
西安电子科技大学数字信号处理英文课件Chapter4 The Z-transform。
More Practical Single-Trace Attacks on the Number Theoretic Transform
side-channel attacks post-quantum cryptography lattice-based cryptography
2019/7/15
Single-trace side-channel attacks are a considerable threat to implementations of classic public-key schemes. For lattice-based cryptography, however, this class of attacks is much less understood, an...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
BUILT-UP AREA DETECTION FROM HIGH-RESOLUTION SATELLITE IMAGES USING MULTI-SCALE WAVELET TRANSFORM AND LOCAL SPATIAL STATISTICS
Built-up Area Detection High-resolution Satellite Image Wavelet Transform Local Spatial Statistics
2018/5/11
Recently, built-up area detection from high-resolution satellite images (HRSI) has attracted increasing attention because HRSI can provide more detailed object information. In this paper, multi-resolu...
GF-3 SAR IMAGE DESPECKLING BASED ON THE IMPROVED NON-LOCAL MEANS USING NON-SUBSAMPLED SHEARLET TRANSFORM
GF-3 SAR non-subsampled Shearlet transform image despeckling improved Non-Local Means
2018/5/15
GF-3 synthetic aperture radar (SAR) images are rich in information and have obvious sparse features. However, the speckle appears in the GF-3 SAR images due to the coherent imaging system and it hinde...
延安大学数字信号处理课件Chapter 2 The Discreete-Time Fourier Transform (DTFT)
延安大学 数字信号处理 课件 Chapter 2 The Discreete-Time Fourier Transform (DTFT)
2018/3/15
延安大学数字信号处理课件Chapter 2 The Discreete-Time Fourier Transform (DTFT)。
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Correlation-immune Fourier-Hadamard transform Low Hamming weight
2018/1/27
The correlation immunity of Boolean functions is a property related to cryptography, to error correcting codes, to orthogonal arrays (in combinatorics, which was also a domain of interest of S. Golomb...
The Number Theoretic Transform (NTT) is the time critical function required by cryptographic protocols based on the Ring Learning With Errors problem (RLWE),a popular choice for post-quantum cryptogra...
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
secret-key cryptography known APN functions
2017/6/6
For every positive integers nn, mm and every even positive integer δδ, we derive inequalities satisfied by the Walsh transforms of all vectorial (n,m)(n,m)-functions and prove that the case of equalit...
CONTENT PRESERVING WATERMARKING FOR MEDICAL IMAGES USING SHEARLET TRANSFORM AND SVD
Watermarking Medical images Shearlet transform SVD
2017/6/19
Medical Image Watermarking (MIW) is a special field of a watermarking due to the requirements of the Digital Imaging and COmmunications in Medicine (DICOM) standard since 1993. All 20 parts of the DIC...
Dispersed Cryptography and the Quotient Ring Transform
cryptographic dispersal threshold cryptography foundations
2017/2/21
This paper describes a radically different privacy, security and integrity solution. Dispersed Cryptography converts the cloud from a security threat into a security asset by combining a standard stre...