Singular values decomposition as a tool enhancing the effeciency of steganographic algorithm
A technique for singular value decomposition of blocks of a cover matrix. Possible results of singular value decomposition operation. Mean values of separatenesses belonging to blocks singular values, received as a result of computing experiment.
Подобные документы
The main types of noise and filters that remove them from the image and analyze the apparent differences in the distribution of the image (using the watershed algorithm). Choosing the best filter to use when working with the watershed algorithm.
статья, добавлен 14.01.2017An overview of machine learning applications for analyzing genome data. Molecular medicine and gene therapy. DNA and RNA are mobile genetic elements. Possible applications of transposons. Cross check software algorithm. Recognition of relocatable items.
дипломная работа, добавлен 10.12.2019Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.
статья, добавлен 22.12.2016The adaptive learning algorithm for "extended neo-fuzzy neuron" is proposed, that has both following and smoothing properties and allows to solve problems of prediction, filtering and smoothing of non-stationary disturbed stochastic and chaotic signals.
статья, добавлен 29.07.2016Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.
статья, добавлен 27.01.2019Questionnaires are the tools uses in lexical typology with collect data for low-resourced languages, for which there are no large corpora or detailed dictionaries. Algorithm for automatically collect visual stimuli for lexico-typological research.
дипломная работа, добавлен 04.12.2019The method and algorithm for realization of arithmetic operations in the system of remainder classes. The principal advantage of the suggested method. The algorithms for realization of arithmetic operations of summation, deduction and multiplication.
статья, добавлен 14.07.2016Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
статья, добавлен 08.03.2014- 85. Internal Memory
Semiconductor Memory Types. Memory Cell Operation. Dynamic and Static RAM. DRAM Operation. SRAM v DRAM. Read Only Memory (ROM). Organisation in detail. Interleaved Memory, Error Correction. Synchronous DRAM (SDRAM) and RAMBUS. DDR SDRAM Read Timing.
презентация, добавлен 03.06.2012 Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.
статья, добавлен 25.12.2016Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.
дипломная работа, добавлен 01.12.2019Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.
дипломная работа, добавлен 08.03.2014Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
статья, добавлен 27.05.2021Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016Linear Programming is concerned with maximizing or minimizing an equation over certain criteria. Mixed Integer Linear Programming: Techniques for Solving, Contribution of the Project, Solving Using Branch. Schematic for Branch and Cut algorithm.
научная работа, добавлен 09.10.2012The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.
статья, добавлен 30.07.2018New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.
статья, добавлен 26.06.2016Program models for some molecular membrane structures functioning. The results of program modeling of biological "voltage-activated nanostructures". Simulation was done on the base of experimental results of electrical currents studying in brain neurons.
статья, добавлен 26.06.2016Приближенные методы решения взвешенной задачи о минимальном покрытии множества. Реализация жадного алгоритма и алгоритма Бар-Иегуды-Эвена, сравнение их временной сложности. Применение результатов, полученных с их помощью в других подходах решения задачи.
дипломная работа, добавлен 17.07.2020Разработка Natural Computing - научного направления, объединяющего математические и компьютерные методы с работой естественной системы флоры и фауны. Создание и применение алгоритма муравьиной колонии в задаче поиска пути в графе при наличии ограничений.
статья, добавлен 20.09.2018Show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. The strategy – a general outline. Polynomial construction.
курс лекций, добавлен 08.03.2014Аналоговый и импульсный сигналы (преимущества и недостатки). Позиционная запись чисел. Расчет количества кодов. Технология cloud computing. Структура хранения данных на жестких дисках. Современные поисковые системы. Шифрование и стеганография данных.
шпаргалка, добавлен 06.12.2013- 99. Типы принтеров
Принтеры, способные выводить графическую информацию, являются растровыми устройствами. На сегодняшний день широко применяется шесть технологий для цветной печати: Dot Matrix, Liquid ink-jet, Thermal wax transfer, Dye sublimation, Phase change ink-jet.
курсовая работа, добавлен 27.02.2009 Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014