搜索结果: 136-150 共查到“Techniques”相关记录927条 . 查询时间(0.066 秒)
Animal training techniques teach robots new tricks
Animal training techniques robots new tricks
2016/5/19
Researchers at Washington State University are using ideas from animal training to help non-expert users teach robots how to do desired tasks.The researchers recently presented their work at the inter...
AC-DC rectifier and storage capacitors take up 25% or more of chip area for cost-sensitive passive RFID tags. In this work, we show that these components can be eliminated by utilizing a RF-only circu...
RICH INTERACTIVE MAPPING EXPERIENCE THROUGH OPEN SOURCE FRAMEWORKS AND AJAX DATA VISUALIZATION TECHNIQUES
Online mapping data visualization regional urban indicators
2016/2/29
Community indicator projects across America seek to understand and analyze the inter-relationships of multiple issues over a given
geographic area, typically within an urban region or city. While map...
NEW INTEGRATION APPROACH OF PHOTOGRAMMETRIC AND LIDAR TECHNIQUES FOR ARCHITECTURAL SURVEYS
Integration Image Edge Matching LIDAR Automation Architecture
2016/2/29
In the last few years, LIDAR and image-matching techniques have been employed in many application fields because of their
quickness in point cloud generation. Nevertheless, these techniques do not a...
TSRI and JCVI Scientists Find Popular Stem Cell Techniques Safe
TSRI JCVI Scientists Stem Cell Techniques
2016/3/2
A new study led by scientists at The Scripps Research Institute (TSRI) and the J. Craig Venter Institute (JCVI) shows that the act of creating pluripotent stem cells for clinical use is unlikely to pa...
Identification of the motivational techniques within Motivational Interviewing and relations with behaviour change techniques from the BCTTv1
motivational techniques Motivational Interviewing behaviour change techniques BCTTv1
2016/1/27
Motivational interviewing (MI) has been shown to be a promising approach for promoting health behaviour change in a number of contexts including substance abuse (Jenson, Cushing, & Aylward, 2011), qui...
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Simeck Linear Cryptanalysis Differential Cryptanalysis Linear Hull
2016/1/27
Simeck is a new family of lightweight block ciphers proposed by Yang et al. in CHES'15, which has efficient hardware implementation. In this paper, we find differentials with low hamming weight and hi...
Comparison of Different Image Fusion Techniques for Individual Tree Crown Identification using QUICKBIRD Images
Forestry Image fusion QuickBird High resolution Individual tree crown Zagros
2016/1/25
With the advent of a new generation of high resolution satellites, images are now available with less than 1 meter spatial resolution in
panchromatic mode. For successful individual tree crown ident...
Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
Throughput of RC4 Multithreading in Encryption
2016/1/25
RC4 is the most widely used stream cipher around. So, it is important that it runs cost effectively, with minimum encryption time. In other words, it should give higher throughput. In this paper, a me...
Global Navigation Satellite Systems (GNSS) were initially developed in the early seventies to improve global positioning and navigation from space. The Global Positioning System (GPS) was the first sy...
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
SIMON lightweight block cipher bit condition
2016/1/9
SIMON is a family of lightweight block ciphers which are
designed by the U.S National Security Agency in 2013. It has totally
10 versions corresponding to different block size 2n and key length
lk,...
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
side-channel analysis DES MAC ISO/IEC 9797-1
2016/1/7
Side-channel analysis is a well-known and efficient hardware
technique to recover embedded secrets in microprocessors. Over the past
years, the state-of-the-art side-channel attacks has significantl...
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Authenticated Key Exchange Blind Signatures Smooth Projective Hash Functions
2016/1/3
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell's appro...
MAPPING POST-OLYMPICS URBAN USE CHANGE IN THE PERIPHERY OF ATHENS USING MULTI-TEMPORAL PIXEL-BASED AND SEGMENTATION TECHNIQUES
Urban Use Change Detection Classification Monitoring Landsat Object Oriented Segmentation Multitemporal
2016/1/3
The city of Athens, Greece, was given the go-ahead to host the 2004 Olympic Games in 1996. Considerable land cover/use changes (LUCC), principally conversions to urban land use from other types, assoc...
IDENTIFYING THE ERRORS IN MONITORING GLACIER CHANGES BY MULTISOURCES DATA USING REMOTE SENSING AND GIS TECHNIQUES IN MT.NAIMONA’NYI REGION IN THE WESTERN HIMALAYAS ON THE TIBETAN PLATEAU IN CHINA
Glacier variation Geographic Information System (GIS) Remote Sensing the hybrid grid unit Mt. Naimona’Nyi Himalayas Mt. Geladandong Tibetan Plateau
2016/1/3
The paper compares the results of two alternative methods for studying glacier variations in Mt. Naimona'Nyi in the western Himalayas on Tibet. This paper describes a grid method for studying multi-te...