24   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Zhen Wang, Fuzhen Sun, Longbo Zhang, Lei Wang and Pingping Liu    
In recent years, binary coding methods have become increasingly popular for tasks of searching approximate nearest neighbors (ANNs). High-dimensional data can be quantized into binary codes to give an efficient similarity approximation via a Hamming dist... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mokhtar Ouamri,Kamel M. Faraoun     Pág. 221 - 229
Emerging High efficiency video coding (HEVC) is expected to be widely adopted in network applications for high definition devices and mobile terminals. Thus, construction of HEVC's encryption schemes that maintain format compliance and bit rate of encryp... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Tao Liu, Bin Yan and Jeng-Shyang Pan    
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
João Roberto Gerônimo, Reginaldo Palazzo Junior, José Camerlo Interlando (Author)     Pág. 881 - 889
New codes over Z4 (the integers mod 4) found by use of a combinatorial optimization algorithm are tabulated. Also, from one of these codes, a new Z4-linear code better than any previously known binary code in terms of number of codewords and minimum dist... ver más
Revista: Acta Scientiarum: Technology    Formato: Electrónico

 
en línea
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov    
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma... ver más
Revista: Information    Formato: Electrónico

 
en línea
Krittapat Bannajak, Nipon Theera-Umpon and Sansanee Auephanwiriyakul    
In this paper, we propose a lossless electrocardiogram (ECG) compression method using a prediction error-based adaptive linear prediction technique. This method combines the adaptive linear prediction, which minimizes the prediction error in the ECG sign... ver más

 
en línea
Wenjing Yang, Liejun Wang, Shuli Cheng, Yongming Li and Anyu Du    
Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neural ne... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sergey Postnov     Pág. 8 - 17
This survey focuses on the principles of JIT compilation ("just-in-time" compilation) of programs. Briefly discusses the history of the development of technologies for dynamic compilation of programs in different programming languages. The implementation... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Hengfu Yang, Jianping Yin and Mingfang Jiang    
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent lo... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Vincent Casseau, Daniel E. R. Espinoza, Thomas J. Scanlon and Richard E. Brown    
hy2Foam is a newly-coded open-source two-temperature computational fluid dynamics (CFD) solver that has previously been validated for zero-dimensional test cases. It aims at (1) giving open-source access to a state-of-the-art hypersonic CFD solver to stu... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Xi Chen, Lei Dong, Hong-Chang Li, Xin-Peng Yao, Peng Wang and Shuang Yao    
Defects and errors in code are different in that they are not detected by editors or compilers but pose a potential risk to software operation. For safety-critical software such as airborne software, the code review process is necessary to ensure the pro... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Zhiguo Chen and Xuanyu Ren    
In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to comput... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mingyang Zhang, Jian Dong, Na Ren and Shuitao Guo    
With the increasing demand for high-precision and difficult-to-obtain geospatial point cloud data copyright protection in military, scientific research, and other fields, research on lossless watermarking is receiving more and more attention. However, mo... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Xiao Zhang, Xin Xiang, Shanshan Lu, Yu Zhou and Shilong Sun    
The need for longer lasting and wider wireless coverage has driven the transition from a single drone to drone swarms. Unlike the single drone, drone swarms can collaboratively achieve full coverage over a target area. However, the existing literature on... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Mengdi Zhang, Ye Zhao, Zhengsheng Han and Fazhan Zhao    
This paper presents a 19 ps precision and 170 M samples/s time-to-digital converter (TDC) in FPGA. Through the direct count method and tapped delay line method, the coarse count and fine count can be extracted, respectively. The direct count is realized ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kaihua Hou, Chengqi Cheng, Bo Chen, Chi Zhang, Liesong He, Li Meng and Shuang Li    
As the amount of collected spatial information (2D/3D) increases, the real-time processing of these massive data is among the urgent issues that need to be dealt with. Discretizing the physical earth into a digital gridded earth and assigning an integral... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Julie Dumas, Henri-Pierre Charles, Kévin Mambu and Maha Kooli    
This article describes a software environment called HybroGen, which helps to experiment binary code generation at run time. As computing architectures are getting more complex, the application performance is becoming data-dependent. The proposed experim... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Nicola Altini, Giuseppe De Giosa, Nicola Fragasso, Claudia Coscia, Elena Sibilano, Berardino Prencipe, Sardar Mehboob Hussain, Antonio Brunetti, Domenico Buongiorno, Andrea Guerriero, Ilaria Sabina Tatò, Gioacchino Brunetti, Vito Triggiani and Vitoantonio Bevilacqua    
The accurate segmentation and identification of vertebrae presents the foundations for spine analysis including fractures, malfunctions and other visual insights. The large-scale vertebrae segmentation challenge (VerSe), organized as a competition at the... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Hwai-Tsu Hu, Ying-Hsiang Lu     Pág. 18 - 32
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Hwai-Tsu Hu, Ying-Hsiang Lu    
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »