Results 81 to 90 of about 891,343 (292)

Hiding image with inception transformer

open access: yesIET Image Processing
Image steganography aims to hide secret data in the cover media for covert communication. Though many deep‐learning‐based image steganography methods have been presented, these approaches suffer from the inefficiency of building long‐distance connections
Yunyun Dong   +5 more
doaj   +1 more source

Image gathering, coding, and processing: End-to-end optimization for efficient and robust acquisition of visual information [PDF]

open access: yes
Researchers are concerned with the end-to-end performance of image gathering, coding, and processing. The applications range from high-resolution television to vision-based robotics, wherever the resolution, efficiency and robustness of visual ...
Fales, Carl L., Huck, Friedrich O.
core   +1 more source

Predictors of response and rational combinations for the novel MCL‐1 inhibitor MIK665 in acute myeloid leukemia

open access: yesMolecular Oncology, EarlyView.
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad   +17 more
wiley   +1 more source

Enhanced Segment Compression Steganographic Algorithm

open access: yesAdvances in Electrical and Computer Engineering, 2013
Steganography is the science and art of concealing messages using techniques that allow only the sender and receiver to know of the message?s existence and be able to decipher it. In this article, we would like to present a new steganographic technique
STRATULAT, M.   +2 more
doaj   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Can Image Compression Rely on CLIP?

open access: yesIEEE Access
Coding algorithms are usually designed to faithfully reconstruct images, which limits the expected gains in compression. A new approach based on generative models allows for new compression algorithms that can reach drastically lower compression rates ...
Tom Bachard, Thomas Maugey
doaj   +1 more source

Sparse Coding on Stereo Video for Object Detection [PDF]

open access: yes, 2017
Deep Convolutional Neural Networks (DCNN) require millions of labeled training examples for image classification and object detection tasks, which restrict these models to domains where such datasets are available.
Kenyon, Garrett T.   +2 more
core   +2 more sources

Screening for lung cancer: A systematic review of overdiagnosis and its implications

open access: yesMolecular Oncology, EarlyView.
Low‐dose computed tomography (CT) screening for lung cancer may increase overdiagnosis compared to no screening, though the risk is likely low versus chest X‐ray. Our review of 8 trials (84 660 participants) shows added costs. Further research with strict adherence to modern nodule management strategies may help determine the extent to which ...
Fiorella Karina Fernández‐Sáenz   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy