نتایج جستجو برای: transformation technique

تعداد نتایج: 818025  

2000
Stefan Gruner Murat Kurt Gabriele Taentzer

Graph grammars and graph transformation systems [9] have turned out to be applicable for solving various problems of recent computer science [3][4]. It is also known, however, that pure graph grammars are often no suitable solutions for practical problems, because graph grammar derivations (as any grammar derivations) are of non-deterministic nature whilst deterministic and predictable behavior...

2014
Usama S. Mohammed

This paper describes a computationally efficient hybrid video coding scheme. The proposed hybrid coding scheme combines the advantages of simple hardware complexity of the 3-D discrete cosine transform coding and the high performance of the 3-D set partitioning in hierarchical tree (3-D SPIHT) coding. The modification of the subband video data in the wavelet domain is done based on the DCT tran...

Journal: :molecular biology research communications 0
maral rahimzadeh department of nanobiotechnology, school of biological sciences, tarbiat modares university, tehran, iran majid sadeghizadeh department of molecular genetics, school of biological sciences, tarbiat modares university, tehran, iran farhood najafi department of resin and additives, institute for color science and technology, tehran, iran shahriar arab department of biophysics, school of biological sciences, tarbiat modares university, tehran, iran hamid mobasheri laboratory of membrane biophysics, institute of biochemistry and biophysics, university of tehran, tehran, iran

cacl2 treatment followed by heat shock is the most common method for artificial transformation. here, the cells were transformed using cacl2 treatment either with heat shock (standard protocol) or without heat shock (lab protocol) to comprehend the difference in transformation efficiency. the bl21 strain of escherichia coli (e. coli) was being susceptible using cacl2 treatment. some cells were ...

2013
Fernando Orejas Artur Boronat Ulrike Golas Nikos Mylonakis

Borrowed context graph transformation is a technique developed by Ehrig and Koenig to define bisimilarity congruences from reduction semantics defined by graph transformation. This means that, for instance, this technique can be used for defining bisimilarity congruences for process calculi whose operational semantics can be defined by graph transformation. Moreover, given a set of graph transf...

Journal: :CoRR 2010
Dominik Steenken Heike Wehrheim Daniel Wonisch

Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topologies or reconfigurable software. Being a formal method, graph transformation systems lend themselves to a formal analysis. This has inspired the development of various verification methods, in particular also model chec...

2008
Nabin Ghoshal Jyotsna Kumar Mandal

In this paper a novel technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT) has been proposed to authenticate a gray level PGM, TIFF image by embedding a message/image where 2 x 2 submatrix is taken as source matrix from the image matrix and transform into the frequency domain. Two bits of authenticating message/image are fabricated wi...

طاهرپور کلانتری, حبیب اله, میرعبدالعظیمی, ملیحه,

Today, it looks rather tangibly and conclusively imperative to give rise to changes throughout the state administrate system. It appears quite critical to establish a meritorious and efficient administrate system as well as to detect the factors influencing it in an endeavor to meet the goals of the development plans. The main purpose of this research could be verbalized as surveying and priori...

S. E. Mortazavi Z. Zohrabi

ABSTRACT- In order to produce transgenic rice lines lacking selectable marker gene, biolistic co-transformation technique using gold nanoparticles was adopted. In the first step, the efficiency of different sizes of gold particles was evaluated. The results showed that the efficiency of the nanoparticles in the transformation was comparable to that of the micro particles. Subsequently, two sepa...

2010
Rinaldi Munir Bambang Riyanto Sarwono Sutikno

This paper proposes a transformation scheme for rendering the asymmetric watermarking technique into its asymmetric version. The asymmetric technique uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is a linear combination of the public watermark and a secret sequence. The detection process is imple...

2002
Naoki Chiba Hiroshi Kano

We propose scveral new techniques for mosaic-ing images of Japanese picture scrolls. Previous methods cannot accurately stitch these images, because they are too wide. To solve this problem , we propose three techniques that can stitch without any seams. The first technique adjusts its height of each image in advance. The second technique uses planar projective transformation among three images...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید