Results 31 to 40 of about 870,231 (290)

Adaptively secure non-interactive threshold cryptosystems [PDF]

open access: yesTheoretical Computer Science, 2011
Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least ([email protected]?n) servers needs to act upon a message to produce the result ...
Libert, Benoît, Yung, Moti
openaire   +1 more source

Coal rock crack recognition method based on connectivity threshold segmentation

open access: yesGong-kuang zidonghua
The development morphology of coal rock cracks is an important factor affecting the permeability of coal rock and determining the mechanical features of coal rock mass.
XIAO Fukun, LIU Huanhuan, SHAN Lei
doaj   +1 more source

Anomaly Detection of Wind Turbines Based on Deep Small-World Neural Network

open access: yesApplied Sciences, 2020
Accurate and efficient condition monitoring is the key to enhance the reliability and security of wind turbines. In recent years, an intelligent anomaly detection method based on deep learning networks has been receiving increasing attention.
Meng Li   +3 more
doaj   +1 more source

Efficient Probabilistic Group Testing Based on Traitor Tracing [PDF]

open access: yes, 2013
Inspired by recent results from collusion-resistant traitor tracing, we provide a framework for constructing efficient probabilistic group testing schemes.
Laarhoven, Thijs
core   +4 more sources

Non spontaneous saccadic movements identification in clinical electrooculography using machine learning [PDF]

open access: yes, 2015
In this paper we evaluate the use of the machine learning algorithms Support Vector Machines, K-Nearest Neighbors, CART decision trees and Naive Bayes to identify non spontaneous saccades in clinical electrooculography tests.
Becerra-García, Roberto Antonio   +8 more
core   +1 more source

SAR image change detection based on equal weight image fusion and adaptive threshold in the NSST domain

open access: yesEuropean Journal of Remote Sensing, 2018
In order to improve the accuracy of change detection and reduce the running time, a change detection method based on equal weight image fusion and adaptive threshold in the NSST domain is proposed.
Zhou Wenyan   +4 more
doaj   +1 more source

Defect Detection of Aluminum Alloy Wheels in Radiography Images Using Adaptive Threshold and Morphological Reconstruction

open access: yesApplied Sciences, 2018
In low-pressure casting, aluminum alloy wheels are prone to internal defects such as gas holes and shrinkage cavities, which call for X-ray inspection to ensure quality.
Junsheng Zhang   +3 more
doaj   +1 more source

Adaptive multiresolution schemes with local time stepping for two-dimensional degenerate reaction-diffusion systems

open access: yes, 2008
We present a fully adaptive multiresolution scheme for spatially two-dimensional, possibly degenerate reaction-diffusion systems, focusing on combustion models and models of pattern formation and chemotaxis in mathematical biology.
Baier, Ricardo Ruiz   +3 more
core   +1 more source

An Adaptive Threshold Updating Algorithm for PMT-Based Ultraviolet Communication

open access: yesIEEE Photonics Journal
To address varying environmental conditions, this paper proposes an adaptive threshold updating algorithm for photomultiplier tube (PMT) signals in ultraviolet (UV) communication.
Jingyang Chen   +8 more
doaj   +1 more source

A PAM4 transceiver design scheme with threshold adaptive and tap adaptive

open access: yesEURASIP Journal on Advances in Signal Processing, 2023
To meet the demand of low bit error rate and high bandwidth for high-speed links, a reliable 112 Gb/s four-level pulse amplitude modulation (PAM4) transceiver design scheme with adaptive threshold voltage and adaptive decision feedback equalizer is ...
Xuena Liu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy