نتایج جستجو برای: cosine aftertreatment techniques

تعداد نتایج: 639159  

2005
KULWINDER KAUR K. KAUR

be the Fourier cosine series. The problem of L-convergence of the Fourier cosine series (1.1) has been settled for various special classes of coefficients. Young [9] found that an logn = o(1), n → ∞ is a necessary and sufficient condition for the L-convergence of the cosine series with convex (△an ≥ 0) coefficients, and Kolmogorov [8] extended this result to the cosine series with quasi-convex ( ∞

Journal: :Physical review 2022

We present efficient methods to interpolate data with a quantum computer that complement uploading techniques and post-processing. The algorithms are supported by the Quantum Fourier Transform (QFT) classical signal imaging processing techniques, open door of advantage relevant families data. showcase QFT interpolation method, Cosine (QCT) geared towards natural data, we improve upon them utili...

2013
Adam Bobrowski Wojciech Chojnacki

We show that if the set of all bounded strongly continuous cosine families on a Banach space X is treated as a metric space under the metric of the uniform convergence associated with the operator norm on the space L (X) of all bounded linear operators on X, then the isolated points of this set are precisely the scalar cosine families. By definition, a scalar cosine family is a cosine family wh...

2013
Francesco Osborne Silvia Likavec Federica Cena

Finding similar users in social communities is often challenging, especially in the presence of sparse data or when working with heterogeneous or specialized domains. When computing semantic similarity among users it is desirable to have a measure which allows to compare users w.r.t. any concept in the domain. We propose such a technique which reduces the problems caused by data sparsity, espec...

2011
H. Saleh A. Yahya M. Ashour M. Sayed M. Streun G. Brandenburg H. Larue Xiaowen Kang

The absorption of radiation in multicrystal PET detectors results in different decay-time pulses. The differences between these pulse decay time constants are used to discriminate between different scintillator materials. In this paper, pulse shape discrimination (PSD) techniques based on the discrete sine transform (DST) and discrete cosine transform (DCT) are proposed. These transformations a...

Journal: :IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 1998
Hakan Caglar C. Sinan Güntürk Bülent Sankur Emin Anarim

Two new design techniques for adaptive orthogonal block transforms based on vector quantization (VQ) codebooks are presented. Both techniques start from reference vectors that are adapted to the characteristics of the signal to be coded, while using different methods to create orthogonal bases. The resulting transforms represent a signal coding tool that stands between a pure VQ scheme on one e...

2015
Chaahat Gupta Preeti Gupta Fugen Zhou Harvinder Kaur Sanjit K. Mitra Mohammad Bagher Akbari Ali Aghagolzadeh Hadi Seyedarabi Om Prakash Richa Srivastava Ashish Khare

This paper presents an evaluation of different image fusion techniques. There are many image fusion techniques which have been developed in a number of applications. Image fusion incorporates the data from several images of one scene to obtain an enlightening image which is more appropriate for human visual perception or additional vision processing. Image quality is closely connected to image ...

2008
Agathe Merceron Kalina Yacef

Educational data differs from traditional knowledge discovery domains in several ways. One of them is the fact that it is difficult, or even impossible, to compare different methods or measures a posteriori and deduce which the best is. It is therefore essential to use techniques and measurements that are fairly intuitive and easy to interpret. Extracting the most interesting association rules ...

2012
Surya Pratap Singh Paresh Rawat Sudhir Agrawal

This paper presents a robust watermarking technique for color and grayscale image. The proposed method involves many techniques to conform a secure and robust watermarking. In the proposed technique the watermark is embedded in 3 level of DWT (Discrete Wavelet Transform) and before embedding the watermark image is passed through chaotic encryption process for its security, other important thing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید