Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   3  
      Pure MathematicsSpacePermutation
    • by 
    •   6  
      Pure MathematicsDiscrete MathematicsPowerPermutations
    • by 
    •   13  
      Applied MathematicsDecompositionPure MathematicsDiscrete Mathematics
    • by 
    •   6  
      AlgorithmsData CompressionSorting AlgorithmBlock
    • by 
    •   10  
      Applied MathematicsData StructureSparse MatricesImplementation
    • by 
    •   2  
      Genetic AlgorithmsPermutation
    • by 
    •   8  
      VLSIComputer HardwareClockAsic
    • by 
    •   13  
      ContractConsensusContrattiConsenso
    • by 
    •   17  
      Principal Component AnalysisStatistical AnalysisEcologyExperimental Design
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or recovered by unauthorized... more
    • by  and +1
    •   6  
      EncryptionSteganographySteganalysisPermutation
    • by 
    •   11  
      Probability TheoryStatisticsPredictionBayesian prediction
    • by 
    •   3  
      Tabu SearchTraveling Salesman ProblemPermutation
    • by 
    •   9  
      MathematicsComputer ScienceFormal VerificationInvariant
    • by 
    •   2  
      InversionPermutation
    • by 
    •   12  
      Applied MathematicsHeuristicsComplexityScheduling
Babbitt’s pre-compositional structures (partial orderings) serve as a series of game-like rules affecting the composition of surface details we hear. Especially in Babbitt’s late works (post-1980) these partial ordering rules vary... more
    • by 
    •   20  
      Set TheoryMusical CompositionImprovisation12-tone Composition
    • by 
    •   3  
      PsychoanalysisJacques LacanPermutation
    • by 
    •   4  
      Distributed CognitionEmbodied CognitionElectronic LiteraturePermutation
    • by 
    •   14  
      Applied MathematicsComputational ComplexitySimulated AnnealingScheduling
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the... more
    • by 
    •   5  
      DiffusionPermutationConfusion OrderLogistic Maps
Research interest in rapid structured-light imaging has grown increasingly for the modeling of moving objects, and a number of methods have been suggested for the range capture in a single video frame. The imaging area of a 3D object... more
    • by 
    •   14  
      Computer VisionStructured LightRange ImagingColor Stripe
    • by 
    •   11  
      Tabu SearchAlgorithmFuzzyApproach
This is the most general case for any location of given point in the space which is derived by using basic formula taken from the book "Advanced Geometry by H.C. Rajpoot". Its derivation & detailed explanation has been given in author's... more
    • by 
    •   7  
      Applied MathematicsCalculusLinear AlgebraPhotometry
For structured-light range imaging, colour stripes can be used for increasing the number of distinguishable light patterns compared to binary black-and-white stripes. Therefore, an appropriate use of colour patterns can reduce the number... more
    • by 
    •   8  
      Computer VisionStructured LightRange ImagingColor Stripe
    • by 
    •   11  
      MathematicsCombinatoricsPure MathematicsDiscrete Mathematics
    • by 
    •   17  
      MathematicsComputer ScienceGraph TheoryPure Mathematics
Este documento es para que las personas que lo lean tengan claro conocimiento sobre las permutaciones y el uso de las formulas que esta presenta.
    • by 
    •   5  
      MatematicaMatemáticas y estadisticaFormulasEstadistica Aplicada
The global market today is very competitive. Completion of projects on time and estimating the project completion time is still difficult in some areas like in the printing industry, where skill also plays a predominant role. The print... more
    • by 
    •   8  
      EvaluationTIMEReviewProgram
We propose a practical scheme based on factoring and semantically secure (IND-CPA) in the standard model. The scheme is obtained from a modi.cation of the so called RSA-Paillier [5] scheme. This modification is reminiscent of the ones... more
    • by 
    •   11  
      SemanticsCryptographyProvable SecurityStandard Model
    • by 
    •   9  
      Nonparametric StatisticsBiometricsStratificationLogistic Regression
Partitioning a permutation into a minimum number of monotone subsequences is N Phard. We extend this complexity result to minimum partitioning into k-modal subsequences; here unimodal is the special case k = 1. Based on a network flow... more
    • by 
    •   16  
      MathematicsApplied MathematicsComputer ScienceModeling
    • by 
    •   20  
      Approximation TheoryEconometricsData AnalysisPrincipal Component Analysis
    • by 
    •   6  
      EngineeringMathematical SciencesFACTORISATIONFactorization
    • by 
    •   8  
      EngineeringMathematical SciencesPermanent MagnetsCounting
    • by 
    •   16  
      PsychologyCognitive ScienceExperimental PsychologyMathematics
In this paper, we present algorithms and lower bounds for the Longest Increasing Subsequence (LIS) and Longest Common Subsequence (LCS) problems in the data streaming model.
    • by 
    •   9  
      Applied MathematicsCombinatorial OptimizationPure MathematicsData Models
    • by 
    •   17  
      Principal Component AnalysisStatistical AnalysisEcologyExperimental Design
    • by 
    •   8  
      Mathematical PhysicsMatrix TheoryQuantum entanglementMathematical Sciences
Prove that the cards in a deck of 2^n cards will return to their original positions after n +1 such shuffles. (p. 57) [ n = 6 ; 7 shuffles ] (p. 56) In general, if we have a deck of m cards, then n { + 1 } shuffles will return the cards... more
    • by 
    •   2  
      Permutationcard shuffling
In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutation strategy and plain-image dependence is proposed. The proposed image encryption scheme consists of a confusion process and a diffusion... more
    • by  and +1
    •   9  
      Chaotic cryptographyMultimodalityEncryptionMultimodal Communication
This paper describes a new basis for the implementation of the shifter functional unit in microprocessors that can implement new advanced bit manipulations as well as standard shifter operations. Our design is based on the inverse... more
    • by 
    •   13  
      Distributed ComputingMultimediaComputer HardwareProcessor Architecture
    • by 
    •   11  
      Computational ComplexitySchedulingFlow Shop SchedulingProduction Management
A new type of stochastic dependence for a sequence of random variables is introduced and studied. Precisely, (X_n)_n≥ 1 is said to be conditionally identically distributed (c.i.d.), with respect to a filtration (G_n)_n≥ 0, if it is... more
    • by 
    •   13  
      Probability TheoryStatisticsPredictionBayesian prediction
    • by 
    •   10  
      ZoologyMethodologyEcologyMultivariate Analysis
    • by 
    •   4  
      EconomicsMathematical Models for Social SciencesMathematical SciencesPermutation
    • by 
    •   4  
      Operations ResearchManufacturingHeuristicPermutation