摘要:
An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm such that the leaked information can not be aligned in time to allow an attacker to break the encryption.
摘要:
An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm such that the leaked information can not be aligned in time to allow an attacker to break the encryption.
摘要:
An apparatus and method for preventing information leakage attacks that utilize timeline alignment. The apparatus and method inserts a random number of instructions into an encryption algorithm such that the leaked information can not be aligned in time to allow an attacker to break the encryption.
摘要:
Separating mixed signals includes receiving the mixed signals from signal sources transmitting from a number of cells. A signal source is operable to transmit a source signal, and a mixed signal comprises at least a subset of the source signals. A complex mixing matrix is established from the mixed signals. The complex mixing matrix describes mixing the source signals to yield the mixed signals. The number of cells is estimated from the mixed signals. The mixed signals are separated using the complex mixing matrix and the estimated number of cells.
摘要:
A method for classification of a target object having a periphery comprises the steps of: selecting a plurality of random first chords D1 across the periphery of the target object; measuring each of the first chords D1 to obtain a plurality of first dimensions; computing for each of the first chords D1 a second chord D2 across the periphery thus forming a plurality of D1, D2 pairs of chords; measuring the second chords D2 for all pairs to obtain second dimensions; computing for each of the pairs of first chords D1 and second chords D2 the ratio D1/D2 of the first dimension to the second dimension to obtain a plurality of first values; computing the logarithm of the first values to obtain a plurality of logarithmic values; computing difference values by subtracting the second dimension from the first dimension for each of the pairs; recording the first values, logarithmic values and difference values in histograms; extracting a vertex lists from the histograms; combining one or more of the vertex lists to obtain a signature indicative of the classification of the object target. For each of the pairs, the second chords are orthogonal to the first chords, and the second chords share a point with the first chords and the periphery.
摘要:
The present invention describes a new QR enclosing voting scheme that allows the extraction of base signatures of objects using a shortest path QR algorithm, providing a probability distribution measuring the occurrence of each random projection base of the object under consideration. The method is very effective in extracting the overall base signatures of a given class of objects. The novelty of this approach is that it is not tailored to the nature of the objects, thus generally applicable, and unmanned. Random projections (RP) have been a powerful tool to reduce the dimensionality of an object while preserving class separation. The inventive voting scheme, after RP, further reduces the dimensionality to no more than the number of the training objects.
摘要:
In a SIMD architecture having a two dimensional array of processing elements, where a controller broadcasts instructions to all processing elements in the array, a dynamically reconfigurable switching means useful to connect four of the processing elements in the array into a group in accordance with either the broadcast instruction of the controller or a special communication instruction held in one processing element of the group, the switch includes at least one dataline connected to each processing element in the group. A multiplexer is connected to each data line and to the controller and to a configuration register. It is adapted to load the special communication instruction from the one processing element in the group into a configuration register and to operate in accord with either the broadcast instruction from the controller or the contents of the configuration register to select one of the four data lines as a source of data and applying the data therefrom to a source output port. A demultiplexer is connected to each data line and to the controller and to said configuration register, and to the source output port of the multiplexer means, and adapted to operate in accord with either the broadcast instruction from the controller or the contents of the configuration register to select one of the four data lines as a source of data and applying the data therefrom to a selected data line. The switch also acts to connect processing elements that cross chip partitions forming the processor array. Up to four such switches can be used to connect a group of four processing elements.
摘要:
A computer architecture 10 for performing iconic and symbolic operations on image data is disclosed. Three levels of processing elements (CAAPP, ICP, GPPA) are disclosed. The processing elements in the lowest level (CAAPP) are provided with a plurality of controllable gates (N, S, E, W, H, V, NW, NE) that are used to selectively connect together processing elements in that level. In such manner, certain algorithms such as the minimum spanning tree algorithm can be efficiently performed.
摘要:
A computer architecture is disclosed for analyzing automatic image understanding problems. The architecture is designed so that it can efficiently perform a wide spectrum of tasks ranging from low level or iconic processing to high level or symbolic processing tasks. A first level (12) of image processing elements is provided for operating on the image matrix on a pixel per processing element basis. A second level (14) of processing elements is provided for operating on a plurality of pixels associated with a given array of first level processing elements. A third level (16) of processing elements is designed to instruct the first and second level processing elements, as well as for operating on a larger segment of the matrix. A host computer (18) is provided that directly communicates with at least each third level processing element. A high degree of parallelism is provided so that information can be readily transferred within the architecture at high speeds.
摘要:
A method of compressing symbolic information stored in a two dimensional matrix of processing elements each containing a binary pixel representing an object mask and an associated multiple-bit valued pixel carrying information related to the object at each of the binary pixels and representative of objects embedded therein. A gated connection network of Processing Elements is formed for each object in the array by comparing the value of the binary pixels stored in each Processing Element with the value of the binary pixels stored in its neighboring Processing elements and closing the gates between Processing Elements that contain the same pixel value and opening the gates between Processing Elements that contain different pixel values. The method sequentially partitions the array matrix into regions and determines, for each gated connection network of Processing Elements in each region, which Processing Elements are at a regional local coordinate minimum and maximum of the array matrix, and assigns a unique source and destination label, respectively, to those Processing Elements. The contents of the multiple-bit valued pixels associated with the binary pixel assigned the source label are combined in a preselected manner with the contents of the multiple-bit valued pixels associated with the binary pixel assigned the destination label. The binary pixel assigned the source label is deleted after combining from any further minimum or maximum coordinate determination.