搜索结果: 1-15 共查到“知识库 Mask”相关记录38条 . 查询时间(0.078 秒)
基于Mask R-CNN的枪弹底火装配质量检测系统设计
底火 装配质量检测 Mask RCNN 机器视觉
2020/8/17
提出了一种基于Mask R-CNN的枪弹底火装配质量检测方案。构建了底火装配质量在线检测系统,该系统利用机器视觉技术设计了基于Mask R-CNN网络模型的检测算法,主要借助目标检测算法 Faster R-CNN进行目标定位,用全卷积神经网络(FCN) 进行分割,实现枪弹底火装配缺陷位置显示和标记。通过实验将本文检测方法与人工检测方式进行了对比,结果表明,该方案能够快速、准确、有效地判别出合格品,...
Non-profiled Mask Recovery: the impact of Independent Component Analysis
Side Channel Analysis Masking Independent Component Analysis
2018/11/13
As one of the most prevalent SCA countermeasures, masking schemes are designed to defeat a broad range of side channel attacks. An attack vector that is suitable for low-order masking schemes is to tr...
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Side Channel Analysis Masking Countermeasures DPA Contest
2018/8/20
Low Entropy Masking Scheme (LEMS) has attracted wide attention for its low-cost feature of small fixed mask sets in Side-Channel-Analysis (SCA). To achieve the expected side channel security, it is ne...
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
Side-channel attacks masking countermeasure refreshing algorithms
2018/5/28
Refreshing algorithms are a critical ingredient for secure masking. They are instrumental in enabling sound composability properties for complex circuits, and their randomness requirements dominate th...
TARGETS MASK U-NET FOR WIND TURBINES DETECTION IN REMOTE SENSING IMAGES
object detection VHRRSI wind turbines shadow wide-field detector U-Net
2018/5/14
To detect wind turbines precisely and quickly in very high resolution remote sensing images (VHRRSI) we propose target mask U-Net. This convolution neural network (CNN), which is carefully designed to...
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
MAC secret-key cryptography
2016/12/8
Probabilistic MAC (message authentication code) is an alternative choice for a stateful MAC where maintaining internal state may be difficult or unsafe. Usually tag of a probabilistic MAC consists of ...
Effect of Wearing the Elevation Training Mask on Aerobic Capacity,Lung Function,and Hematological Variables
Altitude training interval training
2016/7/7
Altitude training and respiratory muscle training (RMT) have been reported to improve performance in elite and well-trained athletes. Several devices (altitude and RMT) have been developed to help ath...
Masking is a widely used countermeasure to protect block
cipher implementations against side-channel attacks. The principle is to
split every sensitive intermediate variable occurring in the computa...
Better Hemodynamic Profile of Laryngeal Mask Airway Insertion Compared to Laryngoscopy and Tracheal Intubation
Laryngeal Masks Airway Management Intubation-Intratracheal Hemodynamics Blood Pressure Heart Rate
2015/11/9
Background: Laryngoscopy and tracheal intubation can cause serious cardiovascular responses in patients such as hypertension, tachycardia, and arrhythmias. Alternative airway maintenance techniques ma...
Decision noise may mask criterion shifts:Reply to Balakrishnan and MacDonald (2008)
Decision criterion shifts Balakrishnan MacDonald
2015/7/28
J. D. Balakrishnan and J. A. MacDonald (2008) argue that RTbased measures of signal detection processes provide evidence against signal detection theory’s notion of a flexible decision criterion.
A RAPID CLOUD MASK ALGORITHM FOR SUOMI NPP VIIRS IMAGERY EDRS
Suomi NPP VIIRS Cloud Mask Algorithm
2015/5/6
Suomi National Polar-orbiting Partnership (NPP) is the first of a new generation of NASA's Earth-observing research satellites. The Suomi NPP Visible Infrared Imaging Radiometer Suite (VIIRS) collec...
Block Ciphers that are Easier to Mask: How Far Can we Go?
implementation issues side-channel analysis
2014/3/12
The design and analysis of lightweight block ciphers has been a very active research area over the last couple of years, with many innovative proposals trying to optimize different performance figures...
改善4-Mask工艺Al腐蚀的方法
有源层 腐蚀
2014/3/20
为了减少制造工艺的流程,改进的4-Mask工艺被广泛应用。但这个工艺仍存在一些问题,如果有源层刻蚀和第二次源漏数据线刻蚀之间间隔时间较长(≥5.9 h),则有源层刻蚀所用气体Cl2形成的活化分子会对沟道内Al造成腐蚀。除了缩短上述间隔时间的方法外,本文应用有源层刻蚀后处理加入SF6/O2的方法,很好地阻止了对Al的腐蚀,对改进后4-Mask工艺的进一步应用具有非常重要的意义。
RESEARCH ON THE IMPROVED IMAGE DODGING ALGORITHM BASED ON MASK TECHNIQUE
Remote sensing images dodging Mask image quality assessment
2014/4/28
The remote sensing image dodging algorithm based on Mask technique is a good method for removing the uneven lightness within a single image. However, there are some problems with this algorithm, such ...
MAN-MADE AREA CHANGE DETECTION BASED ON MASK WITH HJ IMAGE AND TM IMAGE
HJ Image TM Image Change Detection Man-made Area
2014/5/8
Change detection of man-made area with HJ image and TM image is difficult mostly due to HJ image having less bands and lower
spectral response. In this paper, after the image analysis of HJ image an...