![]() ![]() ![]() Broadcast channels with confidential messages / Csiszar I., Korner J. Quantum Cryptography Based On Bell Inequalities for Three-Dimensional System / Kaszlikowski D., Chang K., Oi D.K.L. Quantum cryptography based on Bell’s theorem // Physical Review Letters. Quantum cryptography / Gisin N., Ribordy G., Tittel W., Zbinden H. It is shown, that the protocol with qutrits transfer is more robust against optimal incoherent attack, than the BB84 protocol, the protocol with six states and the Ekert's protocol.ġ. 186 p.By numerical optimization the parameters of eavesdropper's quantum probe are found, at which its information on a key is maximal in a wide interval of a disturbance level between legitimate users. Digital compression and coding of continuous-tone still images: Requirements and guidelines. Zhigljavsky.-London: Chapman & Hall, 2001. Analysis of Time Series Structure: SSA and Related Techniques/ N. on Signal Processing and Multimedia Applications. The Windsurf Library for the Efficient Retrieval of Multimedia Hierarchical Data / I. WALRUS: A similarity retrieval algorithm for image databases / A. 128 - 138.Ģ.Blobworld: A system for region-based image indexing and retrieval / C. Perceptual Evaluation of Color-to-Grayscale Image Conversions / M. The method can be effectively used in computer vision systems for digital image segmentation and also for regions detecting in RBIR-systems.ġ.Cadík, M. It uses different ways of image vectorization for different edge orientations (horizontal, vertical and diagonal). The method is based on the Singular Spectrum Analysis of one-dimensional random sequences and involves preliminary image vectorization. It is effective when detecting both the boundaries between texture regions and the boundaries between regions with a smooth color change gradient. ![]() The method for contour localization in color images is proposed. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |