Ara
Toplam kayıt 45, listelenen: 11-20
Cryptanalysis of a new substitution-diffusion based image cipher
(Elsevier Science BV, 2010-07)
This paper introduces two different types of attacks on a recently proposed cryptosystem based on chaotic standard and logistic maps. In the two attacks, only a pair of (plaintext/ciphertext) was needed to totally break ...
3-D Mesh geometry compression with set partitioning in the spectral domain
(IEEE-INST Electrical Electronics Engineers Inc, 2010-02)
This paper explains the development of a highly efficient progressive 3-D mesh geometry coder based on the region adaptive transform in the spectral mesh compression method. A hierarchical set partitioning technique, ...
On the performance of West's bubble test: A simulation approach
(Elsevier science inc, 2010-12-01)
In this research we examine the ability of West's bubble test [1] in detecting speculative bubbles using Brock's (1982) [2] intertemporal general equilibrium model of asset pricing as the basis for a simulation study. In ...
Bilgi yoğun profesyonel hizmet firmalarında bilgi yönetimi: Türkiye'deki reklam ajansları üzerine bir çalışma
(Bilgesel Yayıncılık San Tic Ltd, 2010-12)
Bu çalışma, bilgi yoğun hizmet üreten firmaların performanslarına etki eden bilgi ile ilgili faktörleri ortaya çıkarmayı amaçlamaktadır. Günümüz ekonomisinde firmaların en önemli stratejik gücü olarak değerlendirilen ...
Multi-view semi-supervised learning for dialog act segmentation of speech
(IEEE-INST Electrical Electronics Engineers Inc, 2010-02)
Sentence segmentation of speech aims at determining sentence boundaries in a stream of words as output by the speech recognizer. Typically, statistical methods are used for sentence segmentation. However, they require ...
Investigation of OSL signals from very deep traps in unfired and fired quartz samples
(Elsevier Science BV, 2010-03-15)
This paper presents an attempt to isolate experimentally optically stimulated luminescence (OSL) signals which may originate from very deep traps (VDT) in quartz samples. As VDT we consider those traps which are responsible ...
Weakly nonlinear waves in water of variable depth: Variable-coefficient Korteweg-de Vries equation
(Pergamon-Elsevier Science Ltd, 2010-09)
In the present work, utilizing the two-dimensional equations of an incompressible inviscid fluid and the reductive perturbation method, we studied the propagation of weakly non-linear waves in water of variable depth. For ...
Cryptanalysis of Fridrich's chaotic image encryption
(World Scientific Publishing, 2010-05)
We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret ...
Multiple-scale expansion for nonlinear ion-acoustic waves
(Freund Publishing House Ltd, 2010-08)
By employing the multiple-scale expansion method, the present work examines non-linear waves in a cold collision less plasma, in the long-wave limit, and obtains a set of KdV equations governing various order terms in the ...
Hierarchical quantization indexing for wavelet and wavelet packet image coding
(Elsevier Science BV, 2010-02)
In this paper, we introduce the quantization index hierarchy, which is used for efficient coding of quantized wavelet and wavelet packet coefficients. A hierarchical classification map is defined in each wavelet subband, ...