Ara
Toplam kayıt 150, listelenen: 61-70
Design and analysis of classifier learning experiments in bioinformatics: survey and case studies
(IEEE Computer Soc, 2012-12)
In many bioinformatics applications, it is important to assess and compare the performances of algorithms trained from data, to be able to draw conclusions unaffected by chance and are therefore significant. Both the design ...
Force-directed approaches to sensor localization
(Assoc Computing Machinery, 2010-09)
As the number of applications of sensor networks increases, so does the interest in sensor network localization, that is, in recovering the correct position of each node in a network of sensors from partial connectivity ...
Equilibrium and stability analysis of delayed neural networks under parameter uncertainties
(Elsevier Science Inc, 2012-02-15)
This paper proposes new results for the existence, uniqueness and global asymptotic stability of the equilibrium point for neural networks with multiple time delays under parameter uncertainties. By using Lyapunov stability ...
Cryptanalysis of a new substitution-diffusion based image cipher
(Elsevier Science BV, 2010-07)
This paper introduces two different types of attacks on a recently proposed cryptosystem based on chaotic standard and logistic maps. In the two attacks, only a pair of (plaintext/ciphertext) was needed to totally break ...
3-D Mesh geometry compression with set partitioning in the spectral domain
(IEEE-INST Electrical Electronics Engineers Inc, 2010-02)
This paper explains the development of a highly efficient progressive 3-D mesh geometry coder based on the region adaptive transform in the spectral mesh compression method. A hierarchical set partitioning technique, ...
Cognitive cooperative MAC with one primary and two secondary users: achievable rates and optimal power control
(IEEE-INST Electrical Electronics Engineers Inc, 2014-11)
We consider a three-user fading cognitive cooperative multiple access channel (MAC) with one primary and two secondary transmitters. We propose two encoding/decoding strategies with varying levels of cooperation, based on ...
Multi-view semi-supervised learning for dialog act segmentation of speech
(IEEE-INST Electrical Electronics Engineers Inc, 2010-02)
Sentence segmentation of speech aims at determining sentence boundaries in a stream of words as output by the speech recognizer. Typically, statistical methods are used for sentence segmentation. However, they require ...
Cryptanalysis of Fridrich's chaotic image encryption
(World Scientific Publishing, 2010-05)
We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret ...
Hierarchical quantization indexing for wavelet and wavelet packet image coding
(Elsevier Science BV, 2010-02)
In this paper, we introduce the quantization index hierarchy, which is used for efficient coding of quantized wavelet and wavelet packet coefficients. A hierarchical classification map is defined in each wavelet subband, ...
An analog integrated circuit beamformer for high-frequency medical ultrasound imaging
(IEEE-INST Electrical Electronics Engineers Inc, 2012-10)
We designed and fabricated a dynamic receive beamformer integrated circuit (IC) in 0.35-mu m CMOS technology. This beamformer IC is suitable for integration with an annular array transducer for high-frequency (30-50 MHz) ...