搜索结果: 1-15 共查到“知识库 Information”相关记录2079条 . 查询时间(0.234 秒)
Integrating Phenological and Geographical Information with Artificial Intelligence Algorithm to Map Rubber Plantations in Xishuangbanna
phenology topography rubber plantation Landsat Xishuangbanna
font style='font-size:12px;'>
2023/12/8
Most natural rubber trees (Hevea brasiliensis) are grown on plantations, making rubber an important industrial crop. Rubber plantations are also an important source of household income for over 20 mil...
Stretchable and self-healable double-network ionogel with strong adhesion and temperature tolerance for information encryption
Ionic liquids Ionogel Double network Fluorescence Information encryption
font style='font-size:12px;'>
2023/11/30
Recently, hydrogels with adjustable mechanical properties have been developed for information security applications. However, the defects such as easy drying and inferior resistance to extreme tempera...
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Pre- and Post-Quantum Cryptography Scalable One-Time Pad (S-OTP) Information Conservational Security (ICS)
font style='font-size:12px;'>
2019/8/14
Whereas it is widely deemed impossible to overcome the optimality of the one-time pad (OTP) cipher in pre- and post-quantum cryptography, this work shows that the optimality of information theoretic s...
Efficient Information-Theoretic Secure Multiparty Computation over Z/pkZ via Galois Rings
MPC Galois Rings
font style='font-size:12px;'>
2019/7/30
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPDZ2kZ2k that allows for secure multiparty computation (MPC) in the dishonest majority setting over the ring of integer...
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
secret sharing general access structures information ratio
font style='font-size:12px;'>
2019/6/3
The contribution vector (convec) of a secret sharing scheme is the vector of all share sizes divided by the secret size. A measure on the convec (e.g., its maximum or average) is considered as a crite...
Best Information is Most Successful
Side-Channel Analysis Information Theory Guessing Entropy
font style='font-size:12px;'>
2019/5/21
Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rat...
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Dynamic Searchable Symmetric Encryption Backward Privacy Forward Privacy
font style='font-size:12px;'>
2019/5/9
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
On Quantum Advantage in Information Theoretic Single-Server PIR
quantum complexity private information retrieval specious security
font style='font-size:12px;'>
2019/3/4
In (single-server) Private Information Retrieval (PIR), a server holds a large database DBDB of size nn, and a client holds an index i∈[n]i∈[n] and wishes to retrieve DB[i]DB[i] without revealing ii t...
AUTOMATING THE VERIFICATION OF HERITAGE BUILDING INFORMATION MODELS CREATED FROM POINT CLOUD DATA
3D analysis as-built BIM model checking point clouds deviations walls
font style='font-size:12px;'>
2019/3/2
The use of remote sensors to acquire metric information for building information modelling (BIM) of heritage buildings is now common. Problematically, the creation of models from that information is s...
INFORMATION MODELING AND LANDSCAPE: INTERVENTION METHODOLOGY FOR READING COMPLEX SYSTEMS
Landscape Survey Parametrization Heritage Point Cloud BIM, LIM
font style='font-size:12px;'>
2019/3/1
When we talk about landscape and in particular landscape architecture, we refer to a living structure in continuous evolution and in clear contrast to the aesthetic and geometric immobility of the sin...
An Information Obfuscation Calculus for Encrypted Computing
Applications foundations information theory
font style='font-size:12px;'>
2019/1/29
Relative cryptographic semantic security for encrypted words of user data at runtime holds in the emerging field of encrypted computing, in conjunction with an appropriate instruction set and compiler...
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
information theoretic multi-party computation oblivious linear evaluation
font style='font-size:12px;'>
2019/1/2
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an evaluation of a sender's private, degree 11 polynomial, without letting the sender learn the evaluation p...
Evaluation of genetic variability of the breed Norik of Muran according to pedigree information
draught horse interbreeding local breed gene origin
font style='font-size:12px;'>
2018/11/23
The Norik of Muran, a unique draught horse bred in Slovakia, belongs to country’s biodiversity treasures. The genetic diversity of this horse type was evaluated on the basis of indicators derived from...
APPLICATION OF VARIOUS OPEN SOURCE VISUALIZATION TOOLS FOR EFFECTIVE MINING OF INFORMATION FROM GEOSPATIAL PETROLEUM DATA
Open Source Geodata Visualization Data Mining Global Petroleum Statistics QGIS, R Sankey Maps
font style='font-size:12px;'>
2019/2/27
This study emphasizes the use of various tools for visualizing geospatial data for facilitating information mining of the global petroleum reserves. In this paper, open-source data on global oil trade...
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
masking shuffling RNG
font style='font-size:12px;'>
2018/11/19
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large am...