|
|
|
Carmine Paolino, Alessio Antolini, Francesco Zavalloni, Andrea Lico, Eleonora Franchi Scarselli, Mauro Mangia, Alex Marchioni, Fabio Pareschi, Gianluca Setti, Riccardo Rovatti, Mattia Luigi Torres, Marcella Carissimi and Marco Pasotti
Analog In-Memory computing (AIMC) is a novel paradigm looking for solutions to prevent the unnecessary transfer of data by distributing computation within memory elements. One such operation is matrix-vector multiplication (MVM), a workhorse of many fiel...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
El-Sayed M. El-Kenawy, Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim and Abdelaziz A. Abdelhamid
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to di...
ver más
|
|
|
|
|
|
|
Fahmi Amhar, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, Shelvie Nidya Neyman, Anggrahito, Dadan Ramdani, Danang Jaya, Dewayany Sutrisno, Sandi Adhitya Kolopaking, Tia Rizka Nuzula Rachma and Murdaningsih
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the tw...
ver más
|
|
|
|
|
|
|
Jaychand Upadhyay and Tad Gonsalves
In computer vision applications, gait-based gender classification is a challenging task as a person may walk at various angles with respect to the camera viewpoint. In some of the viewing angles, the person?s limb movement can be occluded from the camera...
ver más
|
|
|
|
|
|
|
DaYou Jiang and Jongweon Kim
This paper presents a new content-based image retrieval (CBIR) method based on image feature fusion. The deep features are extracted from object-centric and place-centric deep networks. The discrete cosine transform (DCT) solves the strong correlation of...
ver más
|
|
|
|
|
|
|
Ibrahim Furkan Ince
Human activity recognition (HAR) has been an active area in computer vision with a broad range of applications, such as education, security surveillance, and healthcare. HAR is a general time series classification problem. LSTMs are widely used for time ...
ver más
|
|
|
|
|
|
|
Atallah AL-Shatnawi,Faisal Al-Saqqar,Safa?a Alhusban
Pág. pp. 20 - 34
In this paper, we introduce a multi-stage offline holistic handwritten Arabic text recognition model using the Local Binary Pattern (LBP) technique and two machine-learning approaches; Support Vector Machines (SVM) and Artificial Neural Network (ANN). In...
ver más
|
|
|
|
|
|
|
Nikolay Kalashnikov,Olexandr Kokhanov,Olexandr Iakovenko,Nataliia Kushnirenko
Pág. 37 - 42
This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coeffic...
ver más
|
|
|
|
|
|
|
Yuan hong Zhong, Shun Zhang, Rongbu He, Jingyi Zhang, Zhaokun Zhou, Xinyu Cheng, Guan Huang and Jing Zhang
Feature extraction is a key part of the electronic tongue system. Almost all of the existing features extraction methods are ?hand-crafted?, which are difficult in features selection and poor in stability. The lack of automatic, efficient and accurate fe...
ver más
|
|
|
|