نتایج جستجو برای: cosine aftertreatment techniques
تعداد نتایج: 639159 فیلتر نتایج به سال:
Md. Saiful Islam and Md. Haider Ali Institute of Information Technology, Dept. of Computer Science and Engineering, University of Dhaka , Dhaka-1000, Bangladesh E-mail: [email protected], [email protected] Abstract Due to the rapid development of World Wide Web (WWW) and imaging technology, more and more images are available in the Internet and stored in databases. Searching the related...
Recognition of Arabic handwriting characters is a difficult task due to similar appearance of some different characters. However, the selection of the method for feature extraction remains the most important step for achieving high recognition accuracy. The purpose of this paper is to compare the effectiveness of Discrete Cosine Transform and Discrete Wavelet transform to capture discriminative...
Copyright Ownership Authentication by Embedding a Biometric Watermark with Discrete Cosine Transform
In respect to the issues on protecting intellectual property, particular for artistic works in electronic form, some sorts of techniques could be put on a copyright material image to ensure its ownership authentication. In this research, signatories’ biometric fingerprint watermark message in digital format will be embedded into a copyright material image by Discrete Cosine Transform (DCT) – on...
Word fragments or n-grams have been widely used to perform different Natural Language Processing tasks such as information retrieval [1] [2], document categorization [3], automatic summarization [4] or, even, genetic classification of languages [5]. All these techniques share some common aspects such as: (1) documents are mapped to a vector space where n-grams are used as coordinates and their ...
Design and Implementation of Steganography along with secured message services in Mobile Phones is used to provide security to the data that flows across the mobiles. Two people may communicate securely by encrypting the message sent between them. Now a day, several methods are used for communicating secret messages for defense purpose or in order to ensure the privacy of communication between ...
The problem of L1-convergence of the Fourier cosine series (1.1) has been settled for various special classes of coefficients. Young [6] found that an logn= o(1), n→∞ is a necessary and sufficient condition for cosine series with convex (∆an ≥ 0) coefficients, and Kolmogorov [5] extended this result to the cosine series with quasi-convex ( ∑∞ n=1n|∆an−1| < ∞) coefficients. Later, Garrett and St...
Dynamic economic dispatch (DED) deals with the allocation of predicted load demand over a certain period time among thermal generating units at minimum fuel cost. The objective function DED becomes highly complex and nonlinear after considering various operating constraints like valve point loading, ramp rate limit, transmission loss, generation limits. In this study, sine-cosine algorithm has ...
Based on our decomposition of stochastic processes and our asymptotic representations of Fourier cosine coefficients, we deduce an asymptotic formula of approximation errors of hyperbolic cross truncations for bivariate stochastic Fourier cosine series. Moreover we propose a kind of Fourier cosine expansions with polynomials factors such that the corresponding Fourier cosine coefficients decay ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید