Results 81 to 90 of about 891,343 (292)
Hiding image with inception transformer
Image steganography aims to hide secret data in the cover media for covert communication. Though many deep‐learning‐based image steganography methods have been presented, these approaches suffer from the inefficiency of building long‐distance connections
Yunyun Dong +5 more
doaj +1 more source
Lossless Image Coding Using Non-MMSE Algorithms to Calculate Linear Prediction Coefficients. [PDF]
Ulacha G, Łazoryszczak M.
europepmc +1 more source
Image gathering, coding, and processing: End-to-end optimization for efficient and robust acquisition of visual information [PDF]
Researchers are concerned with the end-to-end performance of image gathering, coding, and processing. The applications range from high-resolution television to vision-based robotics, wherever the resolution, efficiency and robustness of visual ...
Fales, Carl L., Huck, Friedrich O.
core +1 more source
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad +17 more
wiley +1 more source
Enhanced Segment Compression Steganographic Algorithm
Steganography is the science and art of concealing messages using techniques that allow only the sender and receiver to know of the message?s existence and be able to decipher it. In this article, we would like to present a new steganographic technique
STRATULAT, M. +2 more
doaj +1 more source
Soft Compression for Lossless Image Coding Based on Shape Recognition. [PDF]
Xin G, Fan P.
europepmc +1 more source
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Can Image Compression Rely on CLIP?
Coding algorithms are usually designed to faithfully reconstruct images, which limits the expected gains in compression. A new approach based on generative models allows for new compression algorithms that can reach drastically lower compression rates ...
Tom Bachard, Thomas Maugey
doaj +1 more source
Sparse Coding on Stereo Video for Object Detection [PDF]
Deep Convolutional Neural Networks (DCNN) require millions of labeled training examples for image classification and object detection tasks, which restrict these models to domains where such datasets are available.
Kenyon, Garrett T. +2 more
core +2 more sources
Screening for lung cancer: A systematic review of overdiagnosis and its implications
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz +12 more
wiley +1 more source

