-
15961
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
Published 2015-01-01“…State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. …”
Get full text
Article -
15962
Quantum Fuzzy Inference Engine for Particle Accelerator Control
Published 2024-01-01“…In this scenario, a quantum fuzzy inference engine (QFIE) was proposed as a quantum algorithm able to generate an exponential computational advantage over conventional fuzzy inference engines. …”
Get full text
Article -
15963
A Bistatic Imaging Method for GEOSAR in the Strip Mode and UAVSAR in the Steering Beam Mode
Published 2018-01-01“…Compared with the traditional imaging method, the simulation validates perfectly the effectiveness of the bistatic imaging algorithm.…”
Get full text
Article -
15964
Neural network analysis for hotel service design in Madrid: the 3Ps methodology and the frontline staff
Published 2018-01-01“…A more discriminating distinction is proposed in this research, based on the neural network algorithm (the Multilayer Perceptron) in order to achieve more efficiency. …”
Get full text
Article -
15965
RATIONALE FOR THE SELECTION OF INNOVATIVE MATERIALS BASED ON THE COST OF THE LIFE CYCLE OF THE GAS PIPELINE
Published 2017-11-01“…A method for selecting an economically viable option for using pipes for a gas pipeline is proposed. An algorithm for calculating the cost of the life cycle of a gas pipeline is given.…”
Get full text
Article -
15966
Stellar Streams Reveal the Mass Loss of Globular Clusters
Published 2025-01-01“…In this work, we employ a novel particle spray algorithm that can accurately reproduce the morphology of streams of various orbital types, enabling us to uncover the relationship between the GC mass-loss history and stream density profiles. …”
Get full text
Article -
15967
Client-oriented approach for assessing the quality of website of freight forwarding company when servicing private clients
Published 2022-05-01“…The results of the survey of respondents outlined the areas of work to improve the section of the website of the Russian Railways Logistics company in terms of website content, transparency of the algorithm for calculating the cost of services, the possibility of choosing a class of service and getting answers to typical questions of interest to the client. …”
Get full text
Article -
15968
A Blind Reversible Robust Watermarking Scheme for Relational Databases
Published 2013-01-01“…In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. …”
Get full text
Article -
15969
Evaluation of the Trapped Surface Wave of a Vertical Electric Dipole Based on Undetermined Coefficient Method in the Presence of N-Layered Region: A Graphical Approach
Published 2019-01-01“…The scope of this paper is to overcome the limitations in root finding algorithm implied by the previous approach and provide solution of poles in stratified media. …”
Get full text
Article -
15970
AI prediction model for endovascular treatment of vertebrobasilar occlusion with atrial fibrillation
Published 2025-02-01“…The developed predictive algorithm (AUC 0.719 internally, 0.684 externally) offers a more sophisticated risk stratification tool, potentially guiding personalized treatment strategies in high-complexity VBAO patients with atrial fibrillation.…”
Get full text
Article -
15971
An optimal path threshold method for rigorously identifying extreme climate events
Published 2025-01-01“…The first case study presents a long-term comparison of air heatwaves and lake heatwaves in Lake Mead. The algorithm adaptively selects thresholds to identify a comparable number of events at various severity levels. …”
Get full text
Article -
15972
The intelligent selenium-enriched tea withering control system
Published 2025-01-01“…Application results show that the system operates stably, accurately measures temperature and humidity in the withering environment, and achieves a control precision of $$\pm 1$$ % through a fuzzy control algorithm. It effectively meets the needs of tea processing in Enshi Prefecture. …”
Get full text
Article -
15973
Spatial Images Feature Extraction Based on Bayesian Nonlocal Means Filter and Improved Contourlet Transform
Published 2012-01-01“…Experimental results both on standard images and spatial images confirm that the proposed algorithm yields significantly better performance than nonsubsampled wavelet transform, contourlet, and curvelet approaches.…”
Get full text
Article -
15974
A Simple Scheme for Belief Propagation Decoding of BCH and RS Codes in Multimedia Transmissions
Published 2008-01-01“…In this paper, we elaborate a new technique for decoding classic binary and nonbinary codes through the belief propagation algorithm. We focus on RS codes included in the recent CDMA2000 standard, and compare the proposed technique with the adaptive belief propagation approach, that is able to ensure very good performance but with higher complexity. …”
Get full text
Article -
15975
Feature Extraction Method for Weak Faults Based on Time-Delayed Feedback Mixed Potential Stochastic Resonance
Published 2020-01-01“…The article analyzes the effects of the delay term, feedback term, and system parameter on the effect of SR and uses the ant colony algorithm (ACA) to optimize the above parameters. Finally, through simulated and engineering experimental results, it is proved that the proposed method has more advantages than the CBSR method in weak fault feature extraction.…”
Get full text
Article -
15976
Measurement of the double-differential inclusive jet cross section in proton-proton collisions at s $$ \sqrt{s} $$ = 5.02 TeV
Published 2025-01-01“…The jets are reconstructed with the anti-k T algorithm using a distance parameter of R = 0.4, within the rapidity interval |y| < 2, and across the kinematic range 0.06 < p T < 1 TeV. …”
Get full text
Article -
15977
A Game-Theoretic Approach for Run-Time Distributed Optimization on MP-SoC
Published 2008-01-01“…Results show that the proposed run-time algorithm requires an average of 20 calculation cycles to find the solution for a 100-processor platform and reaches equivalent performances when comparing with an offline method. …”
Get full text
Article -
15978
Flexible terahertz beam manipulation and convolution operations in light-controllable digital coding metasurfaces
Published 2025-02-01“…We also achieve dynamic modulation of vortex electromagnetic waves based on wireless light-controllable coding metasurfaces. And the genetic algorithm is used to reverse design the array arrangement of the coding metasurface to achieve terahertz broadband radar scattering cross-section reduction. …”
Get full text
Article -
15979
Suppression of MRI Truncation Artifacts Using Total Variation Constrained Data Extrapolation
Published 2008-01-01“…The assumption translates into a total variation minimization problem, which can be solved with a nonlinear optimization algorithm. In the presence of substantial noise, a modified approach offers edge-preserving denoising by allowing for slight deviations from the measured data in addition to supplementing data. …”
Get full text
Article -
15980
Efficient high‐speed framework for sparse representation‐based iris recognition
Published 2021-05-01“…To considerably improve classification performance, SRC is proposed, using a greedy compressed‐sensing recovery algorithm, as opposed to employing the traditional computationally expensive ℓ1 minimisation. …”
Get full text
Article