>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Z-transform相关记录296条 . 查询时间(0.156 秒)
In an article recently published in the journal Science, researchers from the University of Pennsylvania, University of Waterloo, University of Toronto, and Yale University looked at how artificial in...
2023年5月4日,南京农业大学农学院及前沿交叉研究院甘祥超教授团队在TPAMI (IEEE Transactions on Pattern Analysis and Machine Intelligence, IF=24.314)上发表题为“An integrated fast Hough transform for multidimensional data”的研究论文(https://doi...
In this talk, I will introduce the recent results on $L^p$-boundedness of covariant Riesz transform on differential forms on a class of non-compact weighted Riemannian manifolds for $p\in (1,2]$ witho...
西安电子科技大学数字信号处理英文课件Chapter4 The Z-transform
Single-trace side-channel attacks are a considerable threat to implementations of classic public-key schemes. For lattice-based cryptography, however, this class of attacks is much less understood, an...
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
Recently, built-up area detection from high-resolution satellite images (HRSI) has attracted increasing attention because HRSI can provide more detailed object information. In this paper, multi-resolu...
GF-3 synthetic aperture radar (SAR) images are rich in information and have obvious sparse features. However, the speckle appears in the GF-3 SAR images due to the coherent imaging system and it hinde...
The correlation immunity of Boolean functions is a property related to cryptography, to error correcting codes, to orthogonal arrays (in combinatorics, which was also a domain of interest of S. Golomb...
The Number Theoretic Transform (NTT) is the time critical function required by cryptographic protocols based on the Ring Learning With Errors problem (RLWE),a popular choice for post-quantum cryptogra...
For every positive integers nn, mm and every even positive integer δδ, we derive inequalities satisfied by the Walsh transforms of all vectorial (n,m)(n,m)-functions and prove that the case of equalit...
Medical Image Watermarking (MIW) is a special field of a watermarking due to the requirements of the Digital Imaging and COmmunications in Medicine (DICOM) standard since 1993. All 20 parts of the DIC...
This paper describes a radically different privacy, security and integrity solution. Dispersed Cryptography converts the cloud from a security threat into a security asset by combining a standard stre...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...