نتایج جستجو برای: embedding method
تعداد نتایج: 1686665 فیلتر نتایج به سال:
in this paper, we investigate the general fuzzy linear system of equations. the main aim of this paper is based on the embedding approach. we find the necessary and sufficient conditions for the existence of fuzzy solution of the mentioned systems. finally, numerical examples are presented to more illustration of the proposed model.
in this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (steganography). data is encrypted bytwo methods before embedding to increase reliability. then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
Among the adaptive-grid methods, redistribution and embedding techniques have been the focus of more attention by researchers. Simultaneous or combined adaptive techniques have also been used. This paper describes a combination of adaptive-grid embedding and redistribution methods on semi-structured grids for two-dimensional invisid flows. Since the grid is semi-structured, it is possible to us...
Among the adaptive-grid methods, redistribution and embedding techniques have been the focus of more attention by researchers. Simultaneous or combined adaptive techniques have also been used. This paper describes a combination of adaptive-grid embedding and redistribution methods on semi-structured grids for two-dimensional invisid flows. Since the grid is semi-structured, it is possible to us...
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...
it has been proved that sphericity testing for digraphs is an np-complete problem. here, we investigate sphericity of 3-connected single source digraphs. we provide a new combinatorial characterization of sphericity and give a linear time algorithm for sphericity testing. our algorithm tests whether a 3-connected single source digraph with $n$ vertices is spherical in $o(n)$ time.
در این پایان نامه روشی برای تطبیق مدل زبانی ارائه شده است. این روش، برمبنای ترکیب الگوریتم کاهش بعد locally linear embedding و مدل زبانی n-gram عمل میکند. الگوریتم locally linear embedding در کاهش ابعاد ساختار داده اصلی را حفظ مینماید. لذا انتظار داریم ساختار کلی ماتریس سند-کلمه در این کاهش بعد دچار خدشه زیاد نگردد. الگوریتم ارائه شده، با استفاده از زبان c++ و بهره گیری از توابع موجود در ابزاره...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید