نتایج جستجو برای: prone sub

تعداد نتایج: 252464  

2002
Roger ŚWIERCZYŃSKI

The paper deals with a new technique of fragile image watermarking. Proposed technique exploits inter-subband dependencies in order to minimize the influence of inserted watermark on the host image quality. Using the unique watermark based on the low-frequency subband, proposed scheme is resistant against attacks based on series of images analysis. Tampering detection ability of the proposed te...

Journal: :EURASIP J. Adv. Sig. Proc. 2008
Habil Kalkan Nuri Firat Ince Ahmed H. Tewfik Yasemin Yardimci Tom C. Pearson

Hazelnuts with damaged or cracked shells are more prone to infection with aflatoxin producing molds (Aspergillus Flavus). These molds can cause cancer. In this study, we introduce a new approach that separates damaged/cracked hazelnut kernels from good ones by using time-frequency features obtained from impact acoustic signals in an offline step. The proposed technique requires no prior knowled...

2004
Leonardo Querzoni

Content-based routing in publish/subscribe systems is often realized through overlay networks with acyclic topologies. These types of network usually are simple to implement and maintain but are more prone to node crashes. In this research paper we introduce a Topology Management System (TMS), a component of a content-based pub/sub broker. Aim of the TMS is to mask dynamic changes of the underl...

2005
Igor Potucek

For the purpose of Augmented Multi-party Interaction Project (AMI), an image stabilization of the meeting recordings is proposed. The mobile catadioptric system is usually prone to vibrations, which cause the distortion in the transformed panoramic image. The goal is to find proper parameters of the mirror border to image stabilization. Fast method with sub-pixel precision is needed. This paper...

2003
Shiv Lal

Malaria, a disease of antiquity, has proved to be a formidable deterrent to the cultural and socioeconomic progress of man in the tropical, sub-tropical and monsoon prone zones of the world. History is replete with instances of devastation caused by this disease. Wide distribution and its intensity of transmission in India were important factors for slow economic, scientific and industrial prog...

2006
Ian T. Dacre

The formation of enamel, dentine and cementum involves the initial secretion of an organic matrix by ameloblasts, odontoblasts and cementoblasts respectively. This matrix is subsequently ‘loaded’ with mineral principally calcium hydroxyapatite (Ten Cate 1998). When peripheral cementum is still lying sub-gingivally (alveolar crown or gingival crown) (Mitchell 2004), it is nourished by the period...

2012
Margaret Mlingo Valerie J. Ehlers Janetta Roos

Acquired immune deficiency syndrome (AIDS) is an infectious disease that is caused by the human immuno deficiency virus (HIV). The virus affects and destroys the immune system and causes infected people to become more prone to opportunistic infections (Lindsay 2001:S4). Sub Saharan Africa (SSA) is the worst affected area in the world, with 64% of all people with HIV living in SSA (Joint United ...

2016
Michael Opitz Horst Possegger Horst Bischof

Large neural networks trained on small datasets are increasingly prone to overfitting. Traditional machine learning methods can reduce overfitting by employing bagging or boosting to train several diverse models. For large neural networks, however, this is prohibitively expensive. To address this issue, we propose a method to leverage the benefits of ensembles without explicitely training sever...

2012
Amandeep Verma Manpreet Singh Gujral Mark E. Orwat Timothy E. Levin Cynthia E. Irvine

Ad hoc network infrastructure is dynamically changing, and the links are wireless with less capacity and more prone to errors. Adding trust to the existing security infrastructures would enhance the security of these environments. Describing components and their sub-components using ontologies, creates a methodology and mechanism in order to efficiently design. With a viewpoint to add trust as ...

Journal: :Sig. Proc.: Image Comm. 1999
Joachim Hagenauer Eckehard Hundt Thomas Stockhammer B. Wimmer

This paper outlines the basic principles of multiplex techniques for multimedia transmission over existing or upcoming mobile systems. After problem de"nition we evaluate the requirements for an additional layer. According to the two basic tasks, adaptation and multiplexing, this new layer is divided into two sub-layers. Existing multiplex techniques are discussed and a rather new method is pre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید