We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 1,517 results
  1. A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism

    In recent years, various chaos-based image encryption algorithms have been proposed to meet the growing demand for real-time secure image...

    Jun Zheng, Han** Hu in Multimedia Tools and Applications
    Article 11 March 2021
  2. RINO: Robust INner and Outer Approximated Reachability of Neural Networks Controlled Systems

    We present a unified approach, implemented in the RINO tool, for the computation of inner and outer-approximations of reachable sets of discrete-time...
    Eric Goubault, Sylvie Putot in Computer Aided Verification
    Conference paper Open access 2022
  3. Physics-guided machine learning from simulated data with different physical parameters

    Physics-based models are widely used to study dynamical systems in a variety of scientific and engineering problems. However, these models are...

    Shengyu Chen, Nasrin Kalanat, ... **aowei Jia in Knowledge and Information Systems
    Article 31 March 2023
  4. Dimensionality reduction of calcium-imaged neuronal population activity

    Calcium imaging has been widely adopted for its ability to record from large neuronal populations. To summarize the time course of neural activity,...

    Tze Hui Koh, William E. Bishop, ... Byron M. Yu in Nature Computational Science
    Article 29 December 2022
  5. A novel image encryption algorithm based on improved key selection and digital chaotic map

    Chaotic systems are widely used in various fields, but under the finite precision device, chaotic systems would fall into a cycle and subsequently...

    Hongyue **ang, Lingfeng Liu in Multimedia Tools and Applications
    Article 23 March 2021
  6. Regularization by deep learning in signal processing

    In this paper, we explore a new idea of using deep learning representations as a principle for regularization in inverse problems for digital signal...

    Carlos Ramirez Villamarin, Erwin Suazo, Tamer Oraby in Signal, Image and Video Processing
    Article 15 March 2024
  7. Nonlinear Instabilities in TCP-RED

    With the growing size and popularity of the Internet, congestion control has emerged as an important problem. Poor management of congestion can...
    Priya Ranjan, Eyad H. Abed, Richard J. La in Complex Dynamics in Communication Networks
    Chapter
  8. Single Frame Atmospheric Turbulence Mitigation: A Benchmark Study and a New Physics-Inspired Transformer Model

    Image restoration algorithms for atmospheric turbulence are known to be much more challenging to design than traditional ones such as blur or noise...
    Zhiyuan Mao, Ajay Jaiswal, ... Stanley H. Chan in Computer Vision – ECCV 2022
    Conference paper 2022
  9. Spatial-temporal dynamics of a non-monotone reaction-diffusion Hopfield’s neural network model with delays

    In this paper, the spatial-temporal dynamics of a delayed reaction-diffusion Hopfield’s neural network model (HNNM) under a Neumann boundary...

    Wenjie Hu, Quanxin Zhu in Neural Computing and Applications
    Article 02 March 2022
  10. An audio encryption algorithm based on a non-degenerate 2D integer domain hyper chaotic map over GF(2n)

    To ensure the security transmission of audio signals in instant messaging tools, a chaos-based dual-channel one-time one-key audio encryption scheme...

    Yafei Cao, Hongjun Liu in Multimedia Tools and Applications
    Article 05 March 2024
  11. Secure speech coding using chaotic shift keying for encryption combined with error recovery

    This paper presents a speech encryption algorithm utilizing chaotic shift keying alongside error recovery techniques for the G.722.2 codec. The...

    Messaouda Boumaraf, Fatiha Merazka in Multimedia Tools and Applications
    Article 15 June 2024
  12. Adaptive Model for Industrial Systems Using Echo State Networks

    When a model of an industrial system is developed, it is expected that this model performs consistently when applied to other identically designed...
    José Ramón Rodríguez-Ossorio, Antonio Morán, ... Manuel Domínguez in Engineering Applications of Neural Networks
    Conference paper 2023
  13. A Robust Non-Fragile Control Lag Synchronization for Fractional Order Multi-Weighted Complex Dynamic Networks with Coupling Delays

    This problem addresses the fractional order lag synchronization for multi-weighted complex dynamical networks with coupling delays via non-fragile...

    S. Aadhithiyan, R. Raja, ... C. P. Lim in Neural Processing Letters
    Article 07 February 2022
  14. Designing Dynamical Molecular Systems with the PEN Toolbox

    This tutorial paper focuses on the design, simulation, and optimization of polymerase–exonuclease–nickase (PEN) toolbox systems. The PEN toolbox is a...

    Nathanael Aubert-Kato, Leo Cazenille in New Generation Computing
    Article 19 March 2020
  15. Construction of a non-degeneracy 3D chaotic map and application to image encryption with keyed S-box

    In recent years, chaotic maps have been widely used in image encryption. In order to solve the common problems in chaotic encryption schemes, we...

    Mengchen Wang, Hongjun Liu, Mengdi Zhao in Multimedia Tools and Applications
    Article 08 March 2023
  16. Pictorial and Apictorial Polygonal Jigsaw Puzzles from Arbitrary Number of Crossing Cuts

    Jigsaw puzzle solving, the problem of constructing a coherent whole from a set of non-overlap** unordered visual fragments, is fundamental to...

    Peleg Harel, Ofir Itzhak Shahar, Ohad Ben-Shahar in International Journal of Computer Vision
    Article Open access 22 March 2024
  17. Prediction of fault evolution and remaining useful life for rolling bearings with spalling fatigue using digital twin technology

    Abstract

    Quantifying fault severity is a critical part of rolling bearing health management. There are numerous methods for evaluating the severity of...

    Weiying Meng, Yutong Wang, ... Lingling Hou in Applied Intelligence
    Article 09 October 2023
  18. A secure image encryption scheme based on genetic mutation and MLNCML chaotic system

    This paper presents a novel encryption scheme based on genetic operations and Mixed Linear-Nonlinear Coupled Logistic Map Lattice (MLNCML)...

    Ying-Qian Zhang, Hui-Fang Huang, ... **n-Hao Huang in Multimedia Tools and Applications
    Article 25 February 2021
  19. Architectural richness in deep reservoir computing

    Reservoir computing (RC) is a popular class of recurrent neural networks (RNNs) with untrained dynamics. Recently, advancements on deep RC...

    Claudio Gallicchio, Alessio Micheli in Neural Computing and Applications
    Article 15 January 2022
  20. Advanced Numerical Simulation of Dynamic Behavior of Railway Infrastructure Under Extreme Conditions

    Railway infrastructure presents structural diversity, material variability and performance evolution characteristics during its long-term service....
    Wanming Zhai, Lei Xu in Digital Railway Infrastructure
    Chapter 2024
Did you find what you were looking for? Share feedback.