|
|
|
Zhen Wang, Fuzhen Sun, Longbo Zhang, Lei Wang and Pingping Liu
In recent years, binary coding methods have become increasingly popular for tasks of searching approximate nearest neighbors (ANNs). High-dimensional data can be quantized into binary codes to give an efficient similarity approximation via a Hamming dist...
ver más
|
|
|
|
|
|
|
Mokhtar Ouamri,Kamel M. Faraoun
Pág. 221 - 229
Emerging High efficiency video coding (HEVC) is expected to be widely adopted in network applications for high definition devices and mobile terminals. Thus, construction of HEVC's encryption schemes that maintain format compliance and bit rate of encryp...
ver más
|
|
|
|
|
|
|
Tao Liu, Bin Yan and Jeng-Shyang Pan
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini...
ver más
|
|
|
|
|
|
|
João Roberto Gerônimo, Reginaldo Palazzo Junior, José Camerlo Interlando (Author)
Pág. 881 - 889
New codes over Z4 (the integers mod 4) found by use of a combinatorial optimization algorithm are tabulated. Also, from one of these codes, a new Z4-linear code better than any previously known binary code in terms of number of codewords and minimum dist...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma...
ver más
|
|
|
|
|
|
|
Krittapat Bannajak, Nipon Theera-Umpon and Sansanee Auephanwiriyakul
In this paper, we propose a lossless electrocardiogram (ECG) compression method using a prediction error-based adaptive linear prediction technique. This method combines the adaptive linear prediction, which minimizes the prediction error in the ECG sign...
ver más
|
|
|
|
|
|
|
Wenjing Yang, Liejun Wang, Shuli Cheng, Yongming Li and Anyu Du
Recently, deep learning to hash has extensively been applied to image retrieval, due to its low storage cost and fast query speed. However, there is a defect of insufficiency and imbalance when existing hashing methods utilize the convolutional neural ne...
ver más
|
|
|
|
|
|
|
Sergey Postnov
Pág. 8 - 17
This survey focuses on the principles of JIT compilation ("just-in-time" compilation) of programs. Briefly discusses the history of the development of technologies for dynamic compilation of programs in different programming languages. The implementation...
ver más
|
|
|
|
|
|
|
Hengfu Yang, Jianping Yin and Mingfang Jiang
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent lo...
ver más
|
|
|
|
|
|
|
Vincent Casseau, Daniel E. R. Espinoza, Thomas J. Scanlon and Richard E. Brown
hy2Foam is a newly-coded open-source two-temperature computational fluid dynamics (CFD) solver that has previously been validated for zero-dimensional test cases. It aims at (1) giving open-source access to a state-of-the-art hypersonic CFD solver to stu...
ver más
|
|
|
|
|
|
|
Xi Chen, Lei Dong, Hong-Chang Li, Xin-Peng Yao, Peng Wang and Shuang Yao
Defects and errors in code are different in that they are not detected by editors or compilers but pose a potential risk to software operation. For safety-critical software such as airborne software, the code review process is necessary to ensure the pro...
ver más
|
|
|
|
|
|
|
Zhiguo Chen and Xuanyu Ren
In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to comput...
ver más
|
|
|
|
|
|
|
Mingyang Zhang, Jian Dong, Na Ren and Shuitao Guo
With the increasing demand for high-precision and difficult-to-obtain geospatial point cloud data copyright protection in military, scientific research, and other fields, research on lossless watermarking is receiving more and more attention. However, mo...
ver más
|
|
|
|
|
|
|
Xiao Zhang, Xin Xiang, Shanshan Lu, Yu Zhou and Shilong Sun
The need for longer lasting and wider wireless coverage has driven the transition from a single drone to drone swarms. Unlike the single drone, drone swarms can collaboratively achieve full coverage over a target area. However, the existing literature on...
ver más
|
|
|
|
|
|
|
Mengdi Zhang, Ye Zhao, Zhengsheng Han and Fazhan Zhao
This paper presents a 19 ps precision and 170 M samples/s time-to-digital converter (TDC) in FPGA. Through the direct count method and tapped delay line method, the coarse count and fine count can be extracted, respectively. The direct count is realized ...
ver más
|
|
|
|
|
|
|
Kaihua Hou, Chengqi Cheng, Bo Chen, Chi Zhang, Liesong He, Li Meng and Shuang Li
As the amount of collected spatial information (2D/3D) increases, the real-time processing of these massive data is among the urgent issues that need to be dealt with. Discretizing the physical earth into a digital gridded earth and assigning an integral...
ver más
|
|
|
|
|
|
|
Julie Dumas, Henri-Pierre Charles, Kévin Mambu and Maha Kooli
This article describes a software environment called HybroGen, which helps to experiment binary code generation at run time. As computing architectures are getting more complex, the application performance is becoming data-dependent. The proposed experim...
ver más
|
|
|
|
|
|
|
Nicola Altini, Giuseppe De Giosa, Nicola Fragasso, Claudia Coscia, Elena Sibilano, Berardino Prencipe, Sardar Mehboob Hussain, Antonio Brunetti, Domenico Buongiorno, Andrea Guerriero, Ilaria Sabina Tatò, Gioacchino Brunetti, Vito Triggiani and Vitoantonio Bevilacqua
The accurate segmentation and identification of vertebrae presents the foundations for spine analysis including fractures, malfunctions and other visual insights. The large-scale vertebrae segmentation challenge (VerSe), organized as a competition at the...
ver más
|
|
|
|
|
|
|
Hwai-Tsu Hu, Ying-Hsiang Lu
Pág. 18 - 32
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition...
ver más
|
|
|
|
|
|
|
Hwai-Tsu Hu, Ying-Hsiang Lu
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition...
ver más
|
|
|
|