An improved prediction of DCT-based image filters efficiency using regression analysis
In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
Подобные документы
Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016Study the history of the development of high-tech equipment to help people in case of natural disasters. The description of creating a rescue robot with wireless control sensor. Its main advantages: high noise immunity and low power consumption.
презентация, добавлен 23.02.2016New cryptosystems and optimizations. The security of all bits using list decoding. A lattice construction for partial key exposure attack for RSA. Controlling access to an oblivious database using stateful anonymous credentials. Identity-based encryption.
материалы конференции, добавлен 08.03.2014The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
статья, добавлен 14.09.2022A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
книга, добавлен 08.03.2014Значение термина CASE (Computer Aided Software Engineering), история появления CASE-технологий и CASE-средств. Современные CASE-средства: особенности и применение. Классификация CASE-технологий по типам и категориям, их структура и среда функционирования.
курсовая работа, добавлен 10.12.2014Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
статья, добавлен 09.09.2021The Iterative Extraction as extended approach extraction techniques in Principal Component Analysis to other additive data models. Additive models for clustering & similarity data and apply Iterative Extraction for deriving feasible clustering solutions.
учебное пособие, добавлен 08.02.2013Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
курсовая работа, добавлен 25.06.2017Разработка проекта Dialog based, позволяющего вычислять и отображать два значения. Текст программы, выводящей таблицу функций. Проверка выражений с помощью исчисления интеграла с использованием элементов progress и slider. Запись значений в файл.
контрольная работа, добавлен 22.06.2011Assessing the acceptability of the developed IDE. C-SOLVIS is a web-based application designed to facilitate the teaching and learning of C programming in higher education institutions. An iterative prototyping process followed by program creation.
статья, добавлен 16.08.2023Modeling attempts of unauthorized extraction of stegano content (halftone test images) for different variants of disintegration of the array of lengths of the series of reference blocks of the original images. Modeling using portrait and landscape.
статья, добавлен 25.02.2024A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
статья, добавлен 15.09.2012Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
статья, добавлен 27.10.2020Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.
книга, добавлен 08.03.2014The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
статья, добавлен 25.11.2023Классификация, принципы применения инструментов и методов для проектирования программного обеспечения, средства их автоматизации (CASE). Визуализация объектных компьютерных систем, возможности разработки баз данных на языках Visual Basic и Delphi.
реферат, добавлен 20.04.2016Анализ уязвимости различных веб-платформ атакам типа "межсайтовый скриптинг". Классификация атак по их поведению: DOM-based, активные и пассивные. Методы предотвращения кражи данных и несанкционированного доступа злоумышленника к веб-сайту или приложению.
статья, добавлен 12.01.2018The implementation of various pairings on a contemporary 32-bit smartcard, Philips HiPerSmart, an instantiation of the MIPS-32 based SmartMIPS architecture. Pairings as classic cryptographic primitives with a calculation time of as little as 0.15 sec.
статья, добавлен 15.09.2012Image as the object image, the phenomenon, in varying degrees, such a depicted or the process of their creation. Development of a method for classification of text and graphic image area. Training and classification using machine reference Vectors.
статья, добавлен 23.02.2016This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.
статья, добавлен 28.09.2016A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
книга, добавлен 08.03.2014To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
статья, добавлен 29.01.2016Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.
курс лекций, добавлен 08.03.2014