نتایج جستجو برای: cosine aftertreatment techniques
تعداد نتایج: 639159 فیلتر نتایج به سال:
This paper extends the group testing for wavelets (IEEE Trans. Image Process. 11 (2002) 901) algorithm to code coefficients from the wavelet packet transform, the discrete cosine transform, and various lapped transforms. Group testing offers a noticeable improvement over zerotree coding techniques on these transforms; is inherently flexible; and can be adapted to different transforms with relat...
This paper presents a brief overview of some existing fractional order signal processing (FOSP) techniques where the developments in the mathematical communities are introduced; relationship between the fractional operator and long-range dependence is demonstrated, and fundamental properties of each technique and some of its applications are summarized. Specifically, we presented a tutorial on ...
The goal of Iris recognition is to recognize human identity through the textural characteristics of one’s Iris muscular patterns. Iris recognition has been acknowledged as one of the most accurate biometric modalities because of its high recognition rate. Here performance comparison among various proposed techniques of Iris Recognition using the fractional coefficients of transformed Iris image...
Recently multiplicity M, K-regular, orthonormal wavelet bases (that have implications in transform coding applications) have been constructed by several authors 1, 2, 3]. This paper describes and parameterizes the cosine-modulated class of multiplicity M wavelet tight frames (WTFs). In these WTFs (like in the general multiplicity 2 case in 4]), the scaling function uniquely determines the wavel...
In the past decade, the advancement in data communications was significant during explosive growth of the Internet, which led to the demand for using multimedia in portable devices. Video and Audio data streams require a huge amount of bandwidth to be transferred in an uncompressed form. The objective of this paper is to minimize the number of bits required to represent an image and also the ac...
We study the formation of coherent structures in a system with long-range interactions where particles moving on a circle interact through a repulsive cosine potential. Nonequilibrium structures are shown to correspond to statistical equilibria of an effective dynamics, which is derived using averaging techniques. This simple behavior might be a prototype of others observed in more complicated ...
---------------------------------------------------------------------***--------------------------------------------------------------------Abstract A process to insert a secret message or logo into the original image to provide a high level of security as the location of embedded information is secret and the watermark algorithm is not public that is known as watermarking [2].In this paper, im...
Ordered sets of documents are encountered more and more in information distribution systems, such as information retrieval systems (IRS). Classical similarity measures for ordinary sets of documents hence need to be extended to these ordered sets. This is done in this paper using fuzzy set techniques. First a general similarity measure is developed which contains the classical strong similarity...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید