|
|
|
Yin-Chen Lin, Jyun-Jie Wang, Sheng-Chih Yang and Chi-Chun Chen
This paper presents a joint source?channel image transmission model based on a modified trellis construction using variable-length and fixed-length codes. The model employs linear block trellis codes and a modified Bahl?Cocke?Jelinek?Raviv algorithm for ...
ver más
|
|
|
|
|
|
|
Ehsaneddin Jalilian, Michael Linortner and Andreas Uhl
Collective cell movement is an indication of phenomena such as wound healing, embryonic morphogenesis, cancer invasion, and metastasis. Wound healing is a complicated cellular and biochemical procedure in which skin cells migrate from the wound boundarie...
ver más
|
|
|
|
|
|
|
Barbara Cardone, Ferdinando Di Martino and Salvatore Sessa
This research proposes a new image compression method based on the F1-transform which improves the quality of the reconstructed image without increasing the coding/decoding CPU time. The advantage of compressing color images in the YUV space is due to th...
ver más
|
|
|
|
|
|
|
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner...
ver más
|
|
|
|
|
|
|
Urmila Pilania, Rohit Tanwar, Mazdak Zamani and Azizah Abdul Manaf
In today?s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of person...
ver más
|
|
|
|
|
|
|
Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then ...
ver más
|
|
|
|
|
|
|
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ...
ver más
|
|
|
|
|
|
|
Ralf Stemmer, Hai-Dang Vu, Sébastien Le Nours, Kim Grüttner, Sébastien Pillement and Wolfgang Nebel
Fast yet accurate performance and timing prediction of complex parallel data flow applications on multi-processor systems remains a very difficult discipline. The reason for it comes from the complexity of the data flow applications w.r.t. data dependent...
ver más
|
|
|
|
|
|
|
Bethany Gosala, Sripriya Roy Chowdhuri, Jyoti Singh, Manjari Gupta and Alok Mishra
Unified Modeling Language (UML) includes various types of diagrams that help to study, analyze, document, design, or develop any software efficiently. Therefore, UML diagrams are of great advantage for researchers, software developers, and academicians. ...
ver más
|
|
|
|
|
|
|
Yan Liu, Bingxue Lv, Wei Huang, Baohua Jin and Canlin Li
Camera shaking and object movement can cause the output images to suffer from blurring, noise, and other artifacts, leading to poor image quality and low dynamic range. Raw images contain minimally processed data from the image sensor compared with JPEG ...
ver más
|
|
|
|