Ara
Toplam kayıt 207, listelenen: 31-40
EEG signal compression based on classified signature and envelope vector sets
(Wiley, 2009-03)
In this paper, a novel method to compress electroencephalogram (EEG) signal is proposed. The proposed method is based on the generation process of the classified signature and envelope vector sets (CSEVS), which employs ...
Integrating vendors into cooperative design practices
(Taylor & Francis Ltd, 2009)
This paper describes a new approach to cooperative design using distributed, off-the-shelf design components. The ultimate goal is to enable assemblers to rapidly design their products and perform simulations using parts ...
Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps
(Elsevier Science BV, 2009-03-30)
Recently, a cryptosystem based on two-dimensional discretized chaotic maps was proposed [T. Xiang, et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we cryptanalyze the proposal using algebraic methods. We give three ...
Spherical coding algorithm for wavelet image compression
(IEEE-Inst Electrical Electronics Engineers Inc, 2009-05)
In recent literature, there exist many high-performance wavelet coders that use different spatially adaptive coding techniques in order to exploit the spatial energy compaction property of the wavelet transform. Two crucial ...
Minimally redundant 2-D array designs for 3-D medical ultrasound imaging
(IEEE-Inst Electrical Electronics Engineers Inc, 2009-07)
In real-time ultrasonic 3-D imaging, in addition to difficulties in fabricating and interconnecting 2-D transducer arrays with hundreds of elements, there are also challenges in acquiring and processing data from a large ...
Generative and discriminative methods using morphological information for sentence segmentation of Turkish
(IEEE-INST Electrical Electronics Engineers Inc, 2009-07)
This paper presents novel methods for generative, discriminative, and hybrid sequence classification for segmentation of Turkish word sequences into sentences. In the literature, this task is generally solved using statistical ...
Cryptanalysis of a chaos-based image encryption algorithm
(Elsevier Science BV, 2009-03-30)
A chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and ...
Cryptanalysis of image encryption with compound chaotic sequence
(IEEE, 2009)
Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give ...
Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]
(Elsevier Science BV, 2009-09-07)
In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome ...
Incremental construction of classifier and discriminant ensembles
(Elsevier Science Inc, 2009-04-15)
We discuss approaches to incrementally construct an ensemble. The first constructs an ensemble of classifiers choosing a subset from a larger set, and the second constructs an ensemble of discriminants, where a classifier ...