نتایج جستجو برای: cosine aftertreatment techniques

تعداد نتایج: 639159  

Journal: :Sig. Proc.: Image Comm. 2003
Edwin S. Hong Richard E. Ladner Eve A. Riskin

This paper extends the group testing for wavelets (IEEE Trans. Image Process. 11 (2002) 901) algorithm to code coefficients from the wavelet packet transform, the discrete cosine transform, and various lapped transforms. Group testing offers a noticeable improvement over zerotree coding techniques on these transforms; is inherently flexible; and can be adapted to different transforms with relat...

Journal: :Transactions of the Society of Instrument and Control Engineers 2013

2007
YangQuan Chen Rongtao Sun Anhong Zhou

This paper presents a brief overview of some existing fractional order signal processing (FOSP) techniques where the developments in the mathematical communities are introduced; relationship between the fractional operator and long-range dependence is demonstrated, and fundamental properties of each technique and some of its applications are summarized. Specifically, we presented a tutorial on ...

2002
Sudeep D. Thepade Pooja Bidwai

The goal of Iris recognition is to recognize human identity through the textural characteristics of one’s Iris muscular patterns. Iris recognition has been acknowledged as one of the most accurate biometric modalities because of its high recognition rate. Here performance comparison among various proposed techniques of Iris Recognition using the fractional coefficients of transformed Iris image...

1993
Ramesh A. Gopinath

Recently multiplicity M, K-regular, orthonormal wavelet bases (that have implications in transform coding applications) have been constructed by several authors 1, 2, 3]. This paper describes and parameterizes the cosine-modulated class of multiplicity M wavelet tight frames (WTFs). In these WTFs (like in the general multiplicity 2 case in 4]), the scaling function uniquely determines the wavel...

2013
Radha Krishna

In the past decade, the advancement in data communications was significant during explosive growth of the Internet, which led to the demand for using multimedia in portable devices. Video and Audio data streams require a huge amount of bandwidth to be transferred in an uncompressed form. The objective of this paper is to minimize the number of bits required to represent an image and also the ac...

Journal: :Physical review letters 2002
Julien Barré Freddy Bouchet Thierry Dauxois Stefano Ruffo

We study the formation of coherent structures in a system with long-range interactions where particles moving on a circle interact through a repulsive cosine potential. Nonequilibrium structures are shown to correspond to statistical equilibria of an effective dynamics, which is derived using averaging techniques. This simple behavior might be a prototype of others observed in more complicated ...

2016
Anurag sharma

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract A process to insert a secret message or logo into the original image to provide a high level of security as the location of embedded information is secret and the watermark algorithm is not public that is known as watermarking [2].In this paper, im...

Journal: :Inf. Process. Manage. 2003
Leo Egghe Christine Michel

Ordered sets of documents are encountered more and more in information distribution systems, such as information retrieval systems (IRS). Classical similarity measures for ordinary sets of documents hence need to be extended to these ordered sets. This is done in this paper using fuzzy set techniques. First a general similarity measure is developed which contains the classical strong similarity...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید