of CryptologyUSA77%similarity12 Science of Computer ProgrammingNLD68%similarity13 Theory and Practice of Logic ProgrammingGBR67%similarity14 Semantic WebNLD67%similarity15 Designs, Codes, and CryptographyNLD66%similarity16 IACR Transactions on Symmetric CryptologyDEU64%similarity17 CybersecurityGBR64%...
On the other hand, to estimate them in practice, a trihedral corner reflector installed on an XYZ positioning table is employed. Finally, the image of a planar object with the shape of plus is reconstructed using the minimum least‐squares technique. The paper shows that for a 0.81 square ...
Practice varies by field, and embargoes on data sharing are common practice in some communities so, in the absence of funder mandate, the relevant community standards should prevail. Only the “mandates data sharing” policy requires data sharing as a condition for publication and requires data ...
【24hr】Modified majority logic decoding of Reed-Muller codes using factor graphs 包量 机译 作者:Yang Ting-Ya;Chen Houshou; 刊名:IET communications 2018年第7期 摘要:This study investigates the decoding algorithms of binary Reed-Muller (RM) codes. The main goal of the study is to modify ...
The motivation for this research is to find the optimum subset of operational codes (opcodes) that make the best indicators of malware and to determine how long a program has to be monitored to ensure an accurate support vector machine (SVM) classification of benign and malicious software. The...
In this way, when a receiver signal channel performs a correlation operation with the pseudorandom code (PRN) copied by the tracking loop, the actual replicated PRN codes are correlated with the reflected wave and direct wave at the same time. Thus the final result is the superposition of ...
If the gray value of the neighboring pixel is greater than the gray value of the pixel, it is marked as 1; otherwise, it is marked as 0, and then an eight-bit binary number is obtained, which is usually converted to a decimal number to correspond to 256 kinds of LBP codes, and ...
Multi-storied buildings are supposed to be of engineered construction in the sense that they might have been analyzed and designed to meet the provisions of the relevant codes of practice and building bye-laws; the construction might have been supervised by trained persons. In such cases, even ...
1.400 出版商: IET ISSN: 1751-8784 浏览: 17238 关注: 1 征稿 Aims and Scope IET Radar, Sonar & Navigation covers the theory and practice of systems and signals for radar, sonar, radiolocation, navigation and surveillance purposes, in aerospace and terrestrial applications. Examples include advances...