Results 1 to 10 of about 322,955 (175)
The criterion of the best non-symmetric approximant for $n$-variable functions in the space $L_{1, p_2,...,p_n ...
M.Ye. Tkachenko, V.M. Traktynska
doaj +1 more source
Lightweight noncommutative key exchange protocol for IoT environments
Network communications are expanding rapidly in many fields, including telecommunications, the Internet of Things, space, consumer electronics, and the military, with different privacy and security issues at stake in each of these areas.
Shamsa Kanwal+5 more
doaj +1 more source
Sharp inequalities of various metrics on the classes of functions with given comparison function
For any $q > p > 0$, $\omega > 0,$ $d \ge 2 \omega,$ we obtain the following sharp inequality of various metrics $$ \|x\|_{L_q(I_{d})} \le \frac{\|\varphi + c\|_{L_q(I_{2\omega})}}{\|\varphi + c \|_{L_p(I_{2\omega})}} \|x\|_{L_p(I_{d})} $$ on the ...
T.V. Alexandrova, V.A. Kofanov
doaj +1 more source
Lossy Compression using Adaptive Polynomial Image Encoding
In this paper, an efficient lossy compression approach using adaptive-block polynomial curve-fitting encoding is proposed. The main idea of polynomial curve fitting is to reduce the number of data elements in an image block to a few coefficients.
OTHMAN, S.+3 more
doaj +1 more source
To improve the visual quality of noisy medical images acquired by low radiation dose imaging, medical image denoising is highly desirable for clinical disease diagnosis.
Linlin Ji, Qiang Guo, Mingli Zhang
doaj +1 more source
Application of climatological approach to determine the temperature of radiation fogs formation
The effectiveness of a radiation fog forecast is determined by the accuracy of a forecast for two values – temperature of fog formation and minimum air temperature.
O. M. Hrushevskyi, A. O. Yatsyshen
doaj +1 more source
GENERALIZATIONS OF CERTAIN WELL-KNOWN INEQUALITIES FOR RATIONAL FUNCTIONS
In this paper we generalize and refine a result of Wali and Shah concerning the estimate of the derivative of the maximum modulus of rational functions with prescribed poles and restricted zeros.
M. Y. Mir, S. L. Wali, W. M. Shah
doaj +1 more source
Image inpainting-based behavior image secret sharing
The polynomial-based image secret sharing (ISS) scheme encodes a secret image into n shadows assigned to n participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any k or more shadows.
Xuehu Yan+4 more
doaj +1 more source
Some inequalities for the polar derivative of some classes of polynomials [PDF]
In this paper, we investigate an upper bound of the polar derivative of a polynomial of degree where zeros are in and the remaining zeros are outside where .
Nuttapong Arunrat+1 more
doaj +1 more source
Safety Margin Prediction Algorithms Based on Linear Regression Analysis Estimates
In this paper, we consider the problem of approximating the safety margin of a single instance of a technical system based on inaccurate observations at specified time points.
Gurami Tsitsiashvili, Alexandr Losev
doaj +1 more source