We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Recognition Algorithms Based on the Selection of 2D Representative Pseudo-objects

    Building of a recognition algorithms (RA) based on the selection of representative pseudo-objects and providing a solution to the problem of...
    Conference paper 2022
  2. Direct sequence spread spectrum (DSSS) signal detection based on eigenvalues local binary pattern residual network (EL-ResNet)

    Direct sequence spread spectrum (DSSS) communications are highly significant in military and civilian wireless communications because of its ability...

    Bo Wang, Lei Shen, ... Yudong Yao in Signal, Image and Video Processing
    Article 29 March 2024
  3. Pseudo-mixing Time of Random Walks

    We introduce the notion of pseudo-mixing time of a graph, defined as the number of steps in a random walk that suffices for generating a vertex that...
    Itai Benjamini, Oded Goldreich in Computational Complexity and Property Testing
    Chapter 2020
  4. Pseudo-labeling and clustering-based active learning for imbalanced classification of wafer bin map defects

    Wafer bin map (WBM) defect patterns play a crucial role in identifying the root cause of manufacturing defects in the semiconductor industry....

    Siyamalan Manivannan in Signal, Image and Video Processing
    Article 22 December 2023
  5. Geometric semantic genetic programming with normalized and standardized random programs

    Geometric semantic genetic programming (GSGP) represents one of the most promising developments in the area of evolutionary computation (EC) in the...

    Illya Bakurov, José Manuel Muñoz Contreras, ... Leonardo Vanneschi in Genetic Programming and Evolvable Machines
    Article 08 February 2024
  6. An ultrahigh-resolution image encryption algorithm using random super-pixel strategy

    Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to...

    Wei Zhang, Weijie Han, ... Hai Yu in Multimedia Tools and Applications
    Article 19 August 2021
  7. Image encryption algorithm with 2D coupled discrete chaos

    A two-dimensional coupled discrete chaotic system is constructed by combining a two-dimensional coupled map lattice with a dynamic discrete tent map....

    Bo Li, Jiandong Liu, ... ** Wang in Multimedia Tools and Applications
    Article 17 March 2023
  8. Develo** a novel DNA-based steganography algorithm using random table generation with segmentation

    Genome steganography has emerged as a promising field for transmitting large amounts of data over an untrusted channel in the last two decades. DNA...

    Omar Haitham Alhabeeb, Fariza Fauzi, Rossilawati Sulaiman in Multimedia Tools and Applications
    Article 09 October 2023
  9. Random Numbers and Simulation

    A random number or a random variable is a result of a random process where the result is not deterministic. We can only know the exact value of the...
    Haksun Li, PhD in Numerical Methods Using Java
    Chapter 2022
  10. Ascent Guidance for Airbreathing Hypersonic Vehicle Based on Deep Neural Network and Pseudo-spectral Method

    The hypersonic vehicle has received wide attention because of its high speed and large flight domain. However, the ascent guidance is quite...
    Conference paper 2023
  11. A JAYA algorithm based on normal clouds for DNA sequence optimization

    DNA computing is one of the more popular computational methods currently studied, but the requirements for nucleic acid molecules in DNA sequences...

    Donglin Zhu, Siwei Wang, ... Lin Zhang in Cluster Computing
    Article 23 June 2023
  12. Image encryption with one-time password mechanism and pseudo-features

    An image encryption algorithm based on chaotic sequence and permutation matrix is presented in this paper, with the ability to create pseudo-features...

    Yuefeng Lu, Kaimin Yu, **ang Lv in Multimedia Tools and Applications
    Article 01 February 2021
  13. Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence

    Traditional scrambling algorithms frequently rely on static and fixed scrambling modes, which lack the involvement of chaotic sequences during the...

    **ngyuan Wang, Ziyu Leng in Multimedia Tools and Applications
    Article 18 September 2023
  14. A True Random Number Generator Based on ADC Random Interval Sampling

    This paper presents a true random number generator (TRNG) based on traditional Microcontroller Unit (MCU) with analog-to-digital converter (ADC)....
    Gang Li, Haoyang Sun, ... Guangjun Wen in Advances in Artificial Intelligence and Security
    Conference paper 2022
  15. Triplet encoded sequence based membrane protein classification using BiLSTM

    Membrane proteins provide a significant part in cellular activities. The role of membrane proteins is inevitable in drug interactions and in all...

    S. Gomathi, K. Nithish Ram, N. Ani Brown Mary in Multimedia Tools and Applications
    Article 12 April 2024
  16. Connectionist Temporal Sequence Decoding: M-ary Hopfield Neural-Network with Multi-limit Cycle Formulation

    Recently, we have proposed a novel M-ary (multi-level) Hopfield neural-network (MHNN) based auto-associative memory formulation for storage and...
    Vandana M. Ladwani, V. Ramasubramanian in Artificial Neural Networks and Machine Learning – ICANN 2023
    Conference paper 2023
  17. A computational model to identify fertility-related proteins using sequence information

    Fertility is the most crucial step in the development process, which is controlled by many fertility-related proteins, including spermatogenesis-,...

    Yan Lin, Jiashu Wang, ... Hui Ding in Frontiers of Computer Science
    Article 04 September 2023
  18. A novel and Fast hybrid design of cryptosystems for Image via 5-D chaos based random keys and DNA

    The greatest issue in the age of information technology is safeguarding the real-time colour digital image. In this work, a colour image encryption...

    Sankari M, Vanathi M in Multimedia Tools and Applications
    Article 22 December 2023
  19. The Cost of Randomness in Evolutionary Algorithms: Crossover can Save Random Bits

    Evolutionary algorithms make countless random decisions during selection, mutation and crossover operations. These random decisions require a steady...
    Conference paper 2023
  20. A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator

    This paper presents an encryption scheme based on genetic operations and a new hybrid pseudo random number generator (HPRNG). The new HPRNG is...

    Bhaskar Mondal, Tarni Mandal in Multimedia Tools and Applications
    Article 20 February 2020
Did you find what you were looking for? Share feedback.