搜索结果: 1-15 共查到“知识库 Range”相关记录655条 . 查询时间(0.156 秒)
Comparison of partial least squares-discriminant analysis, support vector machines and deep neural networks for spectrometric classification of seed vigour in a broad range of tree species
least squares-discriminant analysis spectrometric classification seed tree species
2023/6/5
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Trapdoor functions range trapdoor hash power DDH
2019/9/3
Substantial work on trapdoor functions (TDFs) has led to many powerful notions and applications. However, despite tremendous work and progress, all known constructions have prohibitively large public ...
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains
regulatable blockchain privacy preserving decentralization
2019/8/19
Privacy protection has been extensively studied in the current blockchain research field. As representations, Monero and Zerocash have realized completely anonymous and amount-hiding transactions. How...
Orthotropic Tension Behavior of Two Typical Chinese Plantation Woods at Wide Relative Humidity Range
orthotropic tensile modulus tensile strength moisture content relative humidity
2024/3/8
Orthotropic tension behaviors of poplar and Chinese fir were investigated at a wide relative humidity (RH) range. Background and Objectives: Poplar and Chinese fir are typical plantation tree species ...
Forward and Backward-Secure Range-Searchable Symmetric Encryption
dynamic symmetric searchable encryption range query forward security
2019/5/21
Dynamic searchable symmetric encryption (DSSE) allows a client to search or update over an outsourced encrypted database. Range query is commonly needed (AsiaCrypt'18) but order-preserving encryption ...
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
INTEGRATION AND COMPARISON OF CLOSE-RANGE SFM METHODOLOGIES FOR THE ANALYSIS AND THE DEVELOPMENT OF THE HISTORICAL CITY CENTER OF BETHLEHEM
UAVs acquisition Structure from Motion Bethlehem historical Cultural Heritage reliable tests
2019/3/4
The present paper illustrates a part of the methodological process of image-based acquisition developed for the documentation of the historical city center of Bethlehem, in the Middle East territory. ...
CONNECTING INSIDE AND OUTSIDE THROUGH 360° IMAGERY FOR CLOSE-RANGE PHOTOGRAMMETRY
360° camera Accuracy Automation Low-cost sensor Orientation
2019/3/1
Metric documentation of buildings requires the connection of different spaces, such as rooms, corridors, floors, and interior and exterior spaces. Images and laser scans have to be oriented and regist...
MAPPING OF STRIP FOREST IN ADAMPUR RANGE (HARYANA) A GEO-INFORMATICS APPROACH
Strip Forest Forest Mapping Social Forestry HRS - WV Smart GIS Decision Support System
2019/2/27
Haryana state is an intensively cultivated state, and deficient in natural forests. One of the mandate of Haryana Forest Department (HFD) is to afforest for maintenance of environmental stability and ...
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
encrypted database volume leakage
2018/11/6
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, ...
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Dynamic searchable symmetric encryption forward security backward security
2018/6/27
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in the encrypted cloud storage. However, it has been reported that DSSE usually suffers from the file-injection attacks an...
Oblivious RAM protocols (ORAMs) allow a client to access data from an untrusted storage device without revealing to that device any information about their access pattern. Typically this is accomplish...
ERROR ANALYSIS AND VALIDATION FOR INSAR HEIGHT MEASUREMENT INDUCED BY SLANT RANGE
InSAR DEM Slant Range Error Simulation Validation SRTM TanDEM-X
2018/5/16
InSAR technique is an important method for large area DEM extraction. Several factors have significant influence on the accuracy of height measurement. In this research, the effect of slant range meas...
COMPENSATION OF THE IONOSPHERIC EFFECTS ON SAR INTERFEROGRAM BASED ON RANGE SPLIT-SPECTRUM AND AZIMUTH OFFSET METHODS – A CASE STUDY OF YUSHU EARTHQUAKE
InSAR Ionospheric effects Range split-spectrum Azimuth offset Ionosphere correction Yushu earthquake
2018/5/14
InSAR technique can measure the surface deformation with the accuracy of centimeter-level or even millimeter and therefore has been widely used in the deformation monitoring associated with earthquake...
BUILDING FACADE MODELING UNDER LINE FEATURE CONSTRAINT BASED ON CLOSE-RANGE IMAGES
Close-range Image Line Feature Building Modeling
2018/5/15
To solve existing problems in modeling facade of building merely with point feature based on close-range images , a new method for modeling building facade under line feature constraint is proposed in...