نتایج جستجو برای: embedding
تعداد نتایج: 73498 فیلتر نتایج به سال:
In this paper, we first present a new type of the concept of open sets by expressing some properties of arbitrary mappings on a power set. With the generalization of the closure spaces in categorical topology, we introduce the generalized topological spaces and the concept of generalized continuity and become familiar with weak and strong structures for generalized topological spaces. Then, int...
This study proposes a novel suboptimal embedding algorithm for binary messages based on a lowweight search embedding (LWSE) strategy. The suboptimal LWSE strategy involves using algorithm to perform an embedding procedure by using a parity check matrix. The optimal embedding algorithm, which is based on the maximun likelihood (ML) algorithm, aims to locate the coset leader and minimize embeddin...
2 Embedding graphs into planarity 3 2.1 embedding algorithms donot use PQ-trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1.1 A planarity embedding algorithm based on the Kuratowski theorem . . . . . . . . 3 2.1.2 An embedding algorithm based on open ear decomposition . . . . . . . . . . . . . . 3 2.1.3 A simplified o (n) planar embedding algorithm for biconnected graphs . . ....
This paper presents a hybrid watermarking technique which mixes additive and multiplicative watermark embedding with emphasis on its robustness versus the imperceptibility of the watermark. The embedding is performed in six wavelet sub-bands using independently three embedding equations and two parameters to modulate the embedding strength for multiplicative and additive embedding. The watermar...
Thomassen characterized some 1-plane embedding as the forbidden configuration such that a given 1-plane embedding of a graph is drawable in straight-lines if and only if it does not contain the configuration [C. Thomassen, Rectilinear drawings of graphs, J. Graph Theory, 10(3), 335-341, 1988]. In this paper, we characterize some 1-plane embedding as the forbidden configuration such that a given...
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
The BFT approach is used to formulate the electronic states in graphene through a non-commutative space in the presence of a constant magnetic field B for the first time. In this regard, we introduce a second class of constrained system, which is not gauge symmetric but by applying BFT method and extending phase space, the second class constraints converts to the first class constraints so th...
Background: The link prediction issue is one of the most widely used problems in complex network analysis. Link prediction requires knowing the background of previous link connections and combining them with available information. The link prediction local approaches with node structure objectives are fast in case of speed but are not accurate enough. On the other hand, the global link predicti...
Ideally an embedding of an N -dimensional dynamical system is N -dimensional. Ideally, an embedding of a dynamical system with symmetry is symmetric. Ideally, the symmetry of the embedding is the same as the symmetry of the original system. This ideal often cannot be achieved. Differential embeddings of the Lorenz system, which possesses a twofold rotation symmetry, are not ideal. While the dif...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید