搜索结果: 1-15 共查到“知识库 Algorithm”相关记录1215条 . 查询时间(0.693 秒)
Assessment of an improved individual tree detection method based on local-maximum algorithm from unmanned aerial vehicle RGB imagery in overlapping canopy mountain forests
CROWN DETECTION POINT CLOUDS UAV IMAGERY SEGMENTATION DELINEATION LIDAR INVENTORY HEIGHT FIELD
2023/12/15
Low consumer-grade cameras attached to small unmanned aerial vehicles (UAV) can easily acquire high spatial resolution images, leading to convenient forest monitoring at small-scales for forest manage...
Fractional Vegetation Cover Estimation Algorithm for FY-3B Reflectance Data Based on Random Forest Regression Method
fractional vegetation cover FY-3B reflectance data random forest regression method
2023/12/8
As an important land surface vegetation parameter, fractional vegetation cover (FVC) has been widely used in many Earth system ecological and climate models. In particular, high-quality and reliable F...
Integrating Phenological and Geographical Information with Artificial Intelligence Algorithm to Map Rubber Plantations in Xishuangbanna
phenology topography rubber plantation Landsat Xishuangbanna
2023/12/8
Most natural rubber trees (Hevea brasiliensis) are grown on plantations, making rubber an important industrial crop. Rubber plantations are also an important source of household income for over 20 mil...
Wildfire Risk Assessment in Liangshan Prefecture, China Based on An Integration Machine Learning Algorithm
frequency ratio MCD64A1 Bayesian optimization support vector machine random forest extreme gradient boosting
2023/11/30
Previous wildfire risk assessments have problems such as subjectivity of weight allocation and the linearization of statistical models, resulting in generally low robustness and low generalization abi...
Tropical Forest Disturbance Monitoring Based on Multi-Source Time Series Satellite Images and the LandTrendr Algorithm
Hainan Island forest disturbances LandTrendr Google Earth engine
2023/11/22
Monitoring disturbances in tropical forests is important for assessing disturbance-related greenhouse gas emissions and the ability of forests to sequester carbon, and for formulating strategies for s...
The LLL algorithm takes as input a basis of a Euclidean lattice, and, within a polynomial number of operations, it outputs another basis of the same lattice but consisting of rather short vectors. We ...
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
foundations lattice techniques
2019/9/16
Abstract. There is a large gap between theory and practice in the complexities of sieving algorithms for solving the shortest vector problem in an arbitrary Euclidean lattice. In this paper, we work t...
On the alpha value of polynomials in the tower number field sieve algorithm
number field sieve discrete logarithm pairing-friendly curve
2019/8/2
In this paper, we provide a notable step towards filling the gap between theory (estimates of running-time) and practice (a discrete logarithm record computation) for the Tower Number Field Sieve (TNF...
k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain
Blockchain bitcoin distributed ledger technology
2019/7/17
Blockchains such as bitcoin rely on reaching global consensus for the distributed ledger, and suffer from a well know scalability problem. We propose an algorithm which can avoid double spending in th...
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
TES Simon's algorithm Quantum period finding algorithm
2019/6/19
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm
Simon's algorithm classical queries symmetric cryptography
2019/6/4
In symmetric cryptanalysis, the model of superposition queries has lead to surprising results, with many constructions being broken in polynomial time thanks to Simon's period-finding algorithm. But t...
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Enigma Machine authenticated encryption polyalphabetic cipher
2019/5/21
Enigma 2000 (E2K) is a cipher that updates the World War II-era Enigma Machine for the twenty-first century. Like the original Enigma, E2K is intended to be computed by an offline device; this prevent...
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
SM3 Side-channel Hash functions
2019/4/3
SM3, the Chinese standard hash algorithm inspired from SHA2, can be attacker by similar means than SHA2 up to an adaptation to its differences. But this kind of attack is based on targeting point of i...
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points
CSIDH post-quantum cryptography Isogeny-based cryptography
2019/4/3
At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a candidate for post-quantum cryptograp...
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Quantum Cryptanalysis Cyclotomic Ideal Lattices
2019/3/4
The hardness of finding short vectors in ideals of cyclotomic number fields (hereafter, Ideal-SVP) can serve as a worst-case assumption for numerous efficient cryptosystems, via the average-case probl...