Results 11 to 20 of about 136,242 (232)

Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The goal of this work is to propose a related-key model for linear cryptanalysis. We start by giving the mean and variance of the difference of sampled correlations of two Boolean functions when using the same sample of inputs to compute both ...
Kaisa Nyberg
doaj   +1 more source

Dimensionality reduction by UMAP reinforces sample heterogeneity analysis in bulk transcriptomic data

open access: yesCell Reports, 2021
Summary: Transcriptomic analysis plays a key role in biomedical research. Linear dimensionality reduction methods, especially principal-component analysis (PCA), are widely used in detecting sample-to-sample heterogeneity, while recently developed non ...
Yang Yang   +10 more
doaj   +1 more source

A Convolution-Based Shearlet Transform in Free Metaplectic Domains

open access: yesJournal of Mathematics, 2021
The free metaplectic transformation (FMT) is a multidimensional integral transform that encompasses a broader range of integral transforms, from the classical Fourier to the more recent linear canonical transforms. The aim of this study is to introduce a
Tarun K. Garg   +3 more
doaj   +1 more source

Using Parameter Elimination to Solve Discrete Linear Chebyshev Approximation Problems

open access: yesMathematics, 2020
We consider discrete linear Chebyshev approximation problems in which the unknown parameters of linear function are fitted by minimizing the least maximum absolute deviation of errors.
Nikolai Krivulin
doaj   +1 more source

Minimal blowing pressure allowing periodic oscillations in a model of bass brass instruments

open access: yesActa Acustica, 2021
In this study, an acoustic resonator – a bass brass instrument – with multiple resonances coupled to an exciter – the player’s lips – with one resonance is modelled by a multidimensional dynamical system, and studied using a continuation and bifurcation ...
Mattéoli Rémi   +6 more
doaj   +1 more source

Extended SLIC superpixels algorithm for applications to non-imagery geospatial rasters

open access: yesInternational Journal of Applied Earth Observations and Geoinformation, 2022
Converting an image to a set of superpixels is a useful preprocessing step in many computer vision applications; it reduces the dimensionality of the data and removes noise. The most popular superpixels algorithm is the Simple Linear Iterative Clustering
Jakub Nowosad, Tomasz F. Stepinski
doaj   +1 more source

Energy-Aware Cloud-Edge Collaborative Task Offloading with Adjustable Base Station Radii in Smart Cities

open access: yesMathematics, 2022
In smart cities, the computing power and battery life of terminal devices (TDs) can be effectively enhanced by offloading tasks to nearby base stations (BSs) with richer resources.
Qian Su, Qinghui Zhang, Xuejie Zhang
doaj   +1 more source

Tailoring a coherent control solution landscape by linear transforms of spectral phase basis [PDF]

open access: yes, 2010
Finding an optimal phase pattern in a multidimensional solution landscape becomes easier and faster if local optima are suppressed and contour lines are tailored towards closed convex patterns.
Herek, Jennifer   +3 more
core   +3 more sources

Stable, Robust and Super Fast Reconstruction of Tensors Using Multi-Way Projections [PDF]

open access: yes, 2014
In the framework of multidimensional Compressed Sensing (CS), we introduce an analytical reconstruction formula that allows one to recover an $N$th-order $(I_1\times I_2\times \cdots \times I_N)$ data tensor $\underline{\mathbf{X}}$ from a reduced set of
Caiafa, Cesar F., Cichocki, Andrzej
core   +4 more sources

Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj   +1 more source

Home - About - Disclaimer - Privacy