Recent
![Convolution Image-based Watermarking for 2D Greyscale Image](https://writelatex.s3.amazonaws.com/published_ver/4043.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=82fbca2f68eddb0c9dc14b16dee872ff89c313dc90cd128a9f642b91b0fd8aa3)
Convolution Image-based Watermarking for 2D Greyscale Image
Watermarking technique for the image is an efficient method for protecting copyright image, and also a huge topic in cryptography. In this paper, two spread spectrum watermarking scheme, the Convolution Image-based Model (CIM) and the Exponential Convolution Image-based Model (ECIM) are going to be formulated and discussed. The watermarking experiment result will be shown and discussed, focusing on the attack scheme, protectability, and the information encryption of the watermark. We will show that the convolution image-based model for invisible watermark is weak of protectability, but it is able to hide the information (the size of watermark must be less than the original image) and store inside the image.
Homer
![Cálculo de momento de inercia de un cilindro solido y una esfera hueca](https://writelatex.s3.amazonaws.com/published_ver/1717.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=e378d6f3567a04a217439c197ad52f81259db66abe8ad4158d2dc9e9a3c6a281)
Cálculo de momento de inercia de un cilindro solido y una esfera hueca
Cálculo de momento de inercia de un cilindro solido y una esfera hueca
Ingrid Diaz
![Tarea 5](https://writelatex.s3.amazonaws.com/published_ver/5893.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=71264cc9a38cb9159d6f89c7f5638b7e81fdf96c4df6d5e0303e8bea5411627f)
Tarea 5
TABLA EQUIVALENCIAS CUANTIFICADORES
larry061198
![Answer 1](https://writelatex.s3.amazonaws.com/published_ver/6986.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=c966bb4ad8a7d6f75b9793355998e6a5892879da365d90510a5f2db82fba5d53)
Answer 1
composition
carlo mariconda
![Kursnotizen Mathematik 1](https://writelatex.s3.amazonaws.com/published_ver/1574.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=31ac5c3180280f1ebac9f4a632bc0fd6ec0cfcd52e8ed2791a6f0ec4b9fe923b)
Kursnotizen Mathematik 1
Dieses Dokument enthält Notizen aus dem Kurs Mathematik 1 des Studienbefähigungslehrgangs 2014/15 der FH Joanneum Kapfenberg.
Josef Steppan
![polinomgyűrű maradékosztálytestei](https://writelatex.s3.amazonaws.com/published_ver/6964.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=caf3af1f1184b083cdb2c55850bcc1135391114b82a00b2d7dc5cf19004c5b3c)
polinomgyűrű maradékosztálytestei
A test feletti polinomgyűrűk maradékosztálytesteit leíró tétel bizonyítása.
Tamás Waldhauser
![ARML Lecture: Intermediate Proofs](https://writelatex.s3.amazonaws.com/published_ver/2933.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=af5791ec07aed2a800987d5c2121f96f981818ff10d59b76ed8fc107acc1368e)
ARML Lecture: Intermediate Proofs
A lecture on intermediate proofs that I taught at ARML.
Justin Stevens
![Matrix-Multiplication Revised](https://writelatex.s3.amazonaws.com/published_ver/6955.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=f135ee6937c8868e8ce59528822c75091ab2e914d357597301c55f8922cc0585)
Matrix-Multiplication Revised
Graphical illustration explaining matrix multiplication
Nana Engo
![Mimetic postprocessing for LFRic](https://writelatex.s3.amazonaws.com/published_ver/7709.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T124423Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=f227bf6f8cdae16ac14d3c6bb7f75dd209a87cfd0b46c14d490c84f6599015e4)
Mimetic postprocessing for LFRic
We describe what mimetic interpolation is and why it is critical for some pre- and post-processing tasks. A simple test case shows how using bilinear interpolation for a flux calculation introduces numerical errors that depend on the grid, the number of segments and the number of quadrature points. In contrast, mimetic interpolation will return the exact result regardless of the grid resolution and the number of segments.
Alex Pletzer and Wolfgang Hayek and Jorge Bornemann