Results 31 to 40 of about 697,010 (291)

PERFORMANCE EVALUATION AND COMPARATIVE ANALYSIS OF WATERMARKING ALGORITHM BASED ON ADAPTIVE PREDICTION METHOD

open access: yesICTACT Journal on Image and Video Processing, 2018
Now a days digital watermarking appeared as a solution for copyright detection, protection and maintenance of important data. This paper deals with a new reversible watermarking algorithm based on adaptive prediction error expansion, which can recover ...
Chetna Sharma, Neeraj Jain
doaj   +1 more source

Capacity Results on Multiple-Input Single-Output Wireless Optical Channels

open access: yes, 2017
This paper derives upper and lower bounds on the capacity of the multiple-input single-output free-space optical intensity channel with signal-independent additive Gaussian noise subject to both an average-intensity and a peak-intensity constraint.
Moser, Stefan M.   +2 more
core   +1 more source

A Cauchy-density-based rate controller for H.264/AVC in low-delay environments [PDF]

open access: yes, 2009
The accuracy of the Cauchy probability density function for modeling of the discrete cosine transform coefficient distribution has already been proved for the frame layer of the rate control subsystem of a hybrid video coder.
de-Frutos-López, Manuel   +3 more
core   +1 more source

A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography

open access: yesPertanika Journal of Science and Technology, 2022
Audio steganography is implemented based on three main features: capacity, robustness, and imperceptibility, but simultaneously implementing them is still a challenge. Embedding data at the Least Significant Bit (LSB) of the audio sample is one of the most implemented audio steganography methods because the method will give high capacity and ...
Muhammad Harith Noor Azam   +2 more
openaire   +1 more source

Xstream-x264: Real-time H.264 streaming with cross-layer integration [PDF]

open access: yes, 2011
We present Xstream-x264: a real-time cross-layer video streaming technique implemented within a well known open-source H.264 video encoder tool x264.
Boreli, Roksana   +2 more
core   +2 more sources

Apply wavelet packet soft threshold noise reduction method to aviation gamma energy spectrum

open access: yesHe jishu, 2022
BackgroundWith the continuous development of nuclear technology, radioactive material exploration requires higher and higher detection accuracy of aerial gamma energy spectrometer, meanwhile, the wavelet packet soft threshold noise reduction method has ...
ZHANG Song   +7 more
doaj   +1 more source

Application of energy difference spectrum of singular value in signal noise reductio

open access: yesGong-kuang zidonghua, 2014
In view of problem that the order of effective rank of matrix reconstruction is difficult to determine in singular value decomposition for noise reduction, a novel signal noise reduction method based on energy difference spectrum of singular value was ...
ZHANG Wenbi
doaj   +1 more source

The optimal design of a binaural sparse-aperture system

open access: yesResults in Physics, 2020
Optical sparse-aperture (OSA) can greatly improve the spatial resolution of optical system. However, its optical designs are complex. This paper proposes a binaural sparse-aperture system with a simple and symmetrical structure, which is composed of ...
Luting Zhang   +5 more
doaj   +1 more source

The Correspondence between Convergence Peaks from Weak Lensing and Massive Dark Matter Haloes

open access: yes, 2018
The convergence peaks, constructed from galaxy shape measurement in weak lensing, is a powerful probe of cosmology as the peaks can be connected with the underlined dark matter haloes.
Fan, Zuhui   +6 more
core   +1 more source

A Two-Dimensional Signal Space for Intensity-Modulated Channels [PDF]

open access: yes, 2012
A two-dimensional signal space for intensity- modulated channels is presented. Modulation formats using this signal space are designed to maximize the minimum distance between signal points while satisfying average and peak power constraints. The uncoded,
Agrell, Erik   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy