Results 21 to 30 of about 956,301 (319)

Network Flow Optimization for Restoration of Images [PDF]

open access: yes, 2001
The network flow optimization approach is offered for restoration of grayscale and color images corrupted by noise. The Ising models are used as a statistical background of the proposed method.
Zalesky, Boris A.
core   +3 more sources

The Gray filtration on phantom maps [PDF]

open access: yesFundamenta Mathematicae, 2001
In this well written and interesting paper, the authors study the Gray index of phantom maps. They introduce a new definition of the Gray index which immediately shows its homotopy invariance and allows them to study naturality properties of the index. This allows them to generalize a theorem of McGibbon and Roitberg on surjectivity of induced maps on ...
Lê Minh Hà, Strom, Jeffrey
openaire   +1 more source

Neuroimaging Evidence of Major Morpho-Anatomical and Functional Abnormalities in the BTBR T+TF/J Mouse Model of Autism [PDF]

open access: yes, 2013
BTBR T+tf/J (BTBR) mice display prominent behavioural deficits analogous to the defining symptoms of autism, a feature that has prompted a widespread use of the model in preclinical autism research.
A Gozzi   +78 more
core   +3 more sources

Three Authentication Schemes without Secrecy over Finite Fields and Galois Rings

open access: yesMathematics, 2021
We provide three new authentication schemes without secrecy. The first two on finite fields and Galois rings, using Gray map for this link. The third construction is based on Galois rings.
Juan Carlos Ku-Cauich   +1 more
doaj   +1 more source

The Gray tensor product via factorisation [PDF]

open access: yes, 2016
We discuss the folklore construction of the Gray tensor product of 2-categories as obtained by factoring the map from the funny tensor product to the cartesian product. We show that this factorisation can be obtained without using a concrete presentation
Bourke, J.D., Gurski, M.N.
core   +2 more sources

Mapping Gray Maritime Networks

open access: yesConnections, 2019
Abstract This research focused on the identification and tracking of subgroups of vessels of interest, owners, operators, ports, cargoes, and specific activities associated with artificial reef enhancement and construction in the South China Sea.
Porter, Wayne   +8 more
openaire   +1 more source

Gray Images of Constacyclic Codes Over Some Polynomial Residue Rings

open access: yesپژوهش‌های ریاضی, 2021
Let  be the quotient ring    where  is the finite field of size   and  is a positive integer. A Gray map  of length  over  is a special map from  to ( .
Reza Sobhani
doaj  

The Steganography Based On Chaotic System for Random LSB Positions

open access: yesWasit Journal of Computer and Mathematics Science, 2022
The objective of hiding text in an image is hiding text without raising suspicions that the image contains a hidden message or text, which leads to protecting and maintaining text confidentiality.
Rusul Mansoor Al-Amri   +2 more
doaj   +1 more source

Assisted Common Information: Further Results [PDF]

open access: yes, 2011
We presented assisted common information as a generalization of G\'acs-K\"orner (GK) common information at ISIT 2010. The motivation for our formulation was to improve upperbounds on the efficiency of protocols for secure two-party sampling (which is a ...
Prabhakaran, Manoj M.   +1 more
core   +1 more source

Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui〉

open access: yesOpen Mathematics, 2018
In this paper, we study linear codes over ring Rk = 𝔽pm[u1, u2,⋯,uk]/〈ui2$\begin{array}{} u^{2}_{i} \end{array} $ = ui, uiuj = ujui〉 where k ≥ 1 and 1 ≤ i, j ≤ k.
Zheng Xiying, Kong Bo
doaj   +1 more source

Home - About - Disclaimer - Privacy