搜索结果: 1-15 共查到“知识库 Target”相关记录233条 . 查询时间(0.359 秒)
A Revised Monte Carlo Method for Target Location with UAV
Monte Carlo Target location UAV Bias
2024/1/19
Target location using UAV equipped with vision system has played an important role in many applications but there remain challenges. One of the principal difficulties is to position a target with a hi...
pssRNAit-a web server for designing effective and specific plant siRNAs with genome-wide off-target assessment
Bioinformatics plant RNAi siRNA efficacy off-target gene silencing VIGS syntasiRNA
2024/1/12
We report an advanced web server named pssRNAit (plant specific small non-coding RNAi tool) that can be used to design a pool of small interfering RNAs (siRNAs) for highly effective, specific, and non...
Intelligent Sensing and Computing in Wireless Sensor Networks for Multiple Target Tracking
Intelligent Sensing Computing Wireless Sensor Networks Multiple Target Tracking
2023/11/20
With sixth generation (6G) communication technologies, target sensing can be finished in milliseconds. The mobile tracking-oriented Internet of Things (MTT-IoT) as a kind of emerging application netwo...
Genome-wide analyses of PAM-relaxed Cas9 genome editors reveal substantial off-target effects by ABE8e in rice
AM-relaxed Cas9 nucleases cytosine base editor adenine base editor off-target effect whole-genome sequencing genome editing rice
2023/7/20
Everybody's a Target: Scalability in Public-Key Encryption
public-key cryptography key encapsulation, mass surveillance elliptic-curve cryptography (ECC)
2019/4/10
For 1≤m≤n1≤m≤n, we consider a natural mm-out-of-nn multi-instance scenario for a public-key encryption (PKE) scheme. An adversary, given nn independent instances of PKE, wins if he breaks at least mm ...
Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols
Cryptanalysis multi-target attack Picnic signature scheme
2018/12/20
Picnic is a signature scheme that was presented at ACM CCS 2017 by Chase et al. and submitted to NIST's post-quantum standardization project. Among all submissions to NIST's project, Picnic is one of ...
SUPERPIXEL BASED FACTOR ANALYSIS AND TARGET TRANSFORMATION METHOD FOR MARTIAN MINERALS DETECTION
Superpixel Factor Analysis Target Transformation Minerals detection Mars
2018/5/15
The Factor analysis and target transformation (FATT) is an effective method to test for the presence of particular mineral on Martian surface. It has been used both in thermal infrared (Thermal Emissi...
RESEARCH ON METHODS OF HIGH COHERENT TARGET EXTRACTION IN URBAN AREA BASED ON PSINSAR TECHNOLOGY
PS points extraction Dispersion of intensity Amplitude threshold Phase analysis Ground deformation
2018/5/14
PSInSAR technology has been widely applied in ground deformation monitoring. Accurate identification of Persistent Scatterers (PS) is key to the success of PSInSAR data processing. In this paper, the ...
RESEARCH ON AIRCRAFT TARGET DETECTION ALGORITHM BASED ON IMPROVED RADIAL GRADIENT TRANSFORMATION
Aircraft Target Detection Radial Gradient Transformation Rotation-Invariant Feature Polar Form Look-up Table
2018/5/17
Aiming at the problem that the target may have different orientation in the unmanned aerial vehicle (UAV) image, the target detection algorithm based on the rotation invariant feature is studied,and t...
TARGET TRANSFORMATION CONSTRAINED SPARSE UNMIXING (TTCSU) ALGORITHM FOR RETRIEVING HYDROUS MINERALS ON MARS: APPLICATION TO SOUTHWEST MELAS CHASMA
Prior information Sparse unmixing Hydrous minerals Mars CRISM
2018/5/15
Quantitative analysis of hydrated minerals from hyperspectral remote sensing data is fundamental for understanding Martian geologic process. Because of the difficulties for selecting endmembers from h...
RAPID TARGET DETECTION IN HIGH RESOLUTION REMOTE SENSING IMAGES USING YOLO MODEL
Object Detection High Resolution Remote Sensing Deep learning YOLO
2018/5/16
Object detection in high resolution remote sensing images is a fundamental and challenging problem in the field of remote sensing imagery analysis for civil and military application due to the complex...
Low-communication parallel quantum multi-target preimage search
quantum cryptanalysis multi-target preimages parallel rho method
2017/8/22
The most important pre-quantum threat to AES-128 is the 1994 van Oorschot--Wiener "parallel rho method", a low-communication parallel pre-quantum multi-target preimage-search algorithm. This algorithm...
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
attribute-based encryption fully homomorphic encryption
2017/5/2
We propose multi target homomorphic attribute-based encryption (MT-HABE) with fully dynamic homomorphic evaluation: it can take as input arbitrary additional ciphertexts during homomorphic computation...
MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
Moving Target Defense Security Capacity Markov Models
2016/12/12
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probabil...
SPMK AND GRABCUT BASED TARGET EXTRACTION FROM HIGH RESOLUTION REMOTE SENSING IMAGES
Spatial Pyramid Matching Bag of Visual Words GrabCut Segmentation Target Extraction
2016/11/23
Target detection and extraction from high resolution remote sensing images is a basic and wide needed application. In this paper, to improve the efficiency of image interpretation, we propose a detect...