Results 51 to 60 of about 696,668 (189)

Cosmology constraints from shear peak statistics in Dark Energy Survey Science Verification data [PDF]

open access: yes, 2016
Shear peak statistics has gained a lot of attention recently as a practical alternative to the two-point statistics for constraining cosmological parameters. We perform a shear peak statistics analysis of the Dark Energy Survey (DES) Science Verification
Marian, L   +2 more
core   +1 more source

A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography

open access: yesPertanika Journal of Science and Technology, 2022
Audio steganography is implemented based on three main features: capacity, robustness, and imperceptibility, but simultaneously implementing them is still a challenge. Embedding data at the Least Significant Bit (LSB) of the audio sample is one of the most implemented audio steganography methods because the method will give high capacity and ...
Muhammad Harith Noor Azam   +2 more
openaire   +1 more source

Efficient method for DCT-domain image arbitrary downsampling

open access: yesTongxin xuebao, 2007
A novel approach to resize Images with m/n resizing ratio in the DCT domain,was proposed which expoits the relationship of DCT coefficients between m 2input blocks and n 2output blocks.Experimental results confirm that the scheme performs about 0.5dB ...
DU Yao-gang1, CAI An-ni2
doaj   +2 more sources

An Effective Computational Ghost Imaging Based on Noise Estimation and Elimination

open access: yesIEEE Access, 2020
To improve the quality of ghost image, we propose an efficient computational ghost imaging method in this article. The primary idea is to estimate the noise value of the ghost image by analyzing and eliminating the source of the noise. The innovativeness
Xiaoxia Wang, Jiangtao Xi, Fengbao Yang
doaj   +1 more source

Steganography in RGB Images Using Adjacent Mean

open access: yesIEEE Access, 2021
Steganography is the practice of hiding information or data in a seemingly innocuous cover medium, such as message, file, image, audio, and video. In the past decades, many approaches of steganography in images were proposed for various applications.
Yun-Hsin Chuang   +3 more
doaj   +1 more source

Evaluation of peak-picking algorithms for protein mass spectrometry [PDF]

open access: yes, 2011
Peak picking is an early key step in MS data analysis. We compare three commonly used approaches to peak picking and discuss their merits by means of statistical analysis. Methods investigated encompass signal-to-noise ratio, continuous wavelet transform,
A Savitzky   +11 more
core   +1 more source

A Secure Medical Image Transmission System Based On 2D Logistic Map and Diffie-Hellman Key Exchange Mechanisms

open access: yesUHD Journal of Science and Technology, 2022
With the tremendous growth of searchable visual media, the content-based medical image retrieval and computer-aided diagnosis systems have become popular in recent years to improve knowledge and provide facilities for radiologists.
Shakhawan H. Wady, Raghad Z. Yousif
doaj   +1 more source

Figure of merit for direct-detection optical channels [PDF]

open access: yes, 1992
The capacity and sensitivity of a direct-detection optical channel are calculated and compared to those of a white Gaussian noise channel. Unlike Gaussian channels in which the receiver performance can be characterized using the noise temperature, the ...
Chen, C.-C.
core   +1 more source

PSNR Improvement Using Different Prediction Coding

open access: yesTikrit Journal of Engineering Sciences, 2015
Differential Pulse Code Modulation (DPCM) is one of the predictive coding techniques. The number of previous pixels employed in the estimate operation is referred to as the order of the predictor. Predictor using one pixel for estimation is called “first
Khamies Khalaf Hasan
doaj  

Enhancement of Image Transmission Using Chaotic Interleaver over Wireless Sensor Network [PDF]

open access: yes, 2016
The wireless sensor networks different from classic wired networks, WMSN differs from other scalar network mainly nature and size of data transmitted, memory resources, and power consumption in each node for processing and transmission.
Hadi, W. A. (Wa’il)   +2 more
core  

Home - About - Disclaimer - Privacy