Ara
Toplam kayıt 204, listelenen: 31-40
Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps
(Elsevier Science BV, 2009-03-30)
Recently, a cryptosystem based on two-dimensional discretized chaotic maps was proposed [T. Xiang, et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we cryptanalyze the proposal using algebraic methods. We give three ...
Spherical coding algorithm for wavelet image compression
(IEEE-Inst Electrical Electronics Engineers Inc, 2009-05)
In recent literature, there exist many high-performance wavelet coders that use different spatially adaptive coding techniques in order to exploit the spatial energy compaction property of the wavelet transform. Two crucial ...
Minimally redundant 2-D array designs for 3-D medical ultrasound imaging
(IEEE-Inst Electrical Electronics Engineers Inc, 2009-07)
In real-time ultrasonic 3-D imaging, in addition to difficulties in fabricating and interconnecting 2-D transducer arrays with hundreds of elements, there are also challenges in acquiring and processing data from a large ...
Generative and discriminative methods using morphological information for sentence segmentation of Turkish
(IEEE-INST Electrical Electronics Engineers Inc, 2009-07)
This paper presents novel methods for generative, discriminative, and hybrid sequence classification for segmentation of Turkish word sequences into sentences. In the literature, this task is generally solved using statistical ...
Cryptanalysis of a chaos-based image encryption algorithm
(Elsevier Science BV, 2009-03-30)
A chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and ...
Cryptanalysis of image encryption with compound chaotic sequence
(IEEE, 2009)
Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give ...
Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]
(Elsevier Science BV, 2009-09-07)
In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome ...
Incremental construction of classifier and discriminant ensembles
(Elsevier Science Inc, 2009-04-15)
We discuss approaches to incrementally construct an ensemble. The first constructs an ensemble of classifiers choosing a subset from a larger set, and the second constructs an ensemble of discriminants, where a classifier ...
Spectral correlation of a digital pulse stream modulated by a cyclostationary sequence in the presence of timing jitter
(IEEE-INST Electrical Electronics Engineers Inc, 2009-02)
Cyclostationarity is an inherent characteristic of many communication signals, which can be exploited for performing various signal processing tasks. Imperfections in the signal generation that affect the cyclic statistics ...
An integrated circuit with transmit beamforming flip-chip bonded to a 2-D CMUT array for 3-D ultrasound imaging
(IEEE-INST Electrical Electronics Engineers Inc, 2009-10)
State-of-the-art 3-D medical ultrasound imaging requires transmitting and receiving ultrasound using a 2-D array of ultrasound transducers with hundreds or thousands of elements. A tight combination of the transducer array ...