Results 1 to 10 of about 1,277,681 (312)
Sharp inequalities of various metrics on the classes of functions with given comparison function
For any $q > p > 0$, $\omega > 0,$ $d \ge 2 \omega,$ we obtain the following sharp inequality of various metrics $$ \|x\|_{L_q(I_{d})} \le \frac{\|\varphi + c\|_{L_q(I_{2\omega})}}{\|\varphi + c \|_{L_p(I_{2\omega})}} \|x\|_{L_p(I_{d})} $$ on the ...
T.V. Alexandrova, V.A. Kofanov
doaj +1 more source
The criterion of the best non-symmetric approximant for $n$-variable functions in the space $L_{1, p_2,...,p_n ...
M.Ye. Tkachenko, V.M. Traktynska
doaj +1 more source
Lossy Compression using Adaptive Polynomial Image Encoding
In this paper, an efficient lossy compression approach using adaptive-block polynomial curve-fitting encoding is proposed. The main idea of polynomial curve fitting is to reduce the number of data elements in an image block to a few coefficients.
OTHMAN, S.+3 more
doaj +1 more source
To improve the visual quality of noisy medical images acquired by low radiation dose imaging, medical image denoising is highly desirable for clinical disease diagnosis.
Linlin Ji, Qiang Guo, Mingli Zhang
doaj +1 more source
Lightweight noncommutative key exchange protocol for IoT environments
Network communications are expanding rapidly in many fields, including telecommunications, the Internet of Things, space, consumer electronics, and the military, with different privacy and security issues at stake in each of these areas.
Shamsa Kanwal+5 more
doaj +1 more source
Image inpainting-based behavior image secret sharing
The polynomial-based image secret sharing (ISS) scheme encodes a secret image into n shadows assigned to n participants. The secret image with high resolution is decoded by Lagrange interpolation when collecting any k or more shadows.
Xuehu Yan+4 more
doaj +1 more source
In India, research on the development of new composite materials is extensively increased. In the present study, composites are developed with the renewable materials of plant and animal-based natural fibers.
Lokesh Kanchugaranahally Sriramamurthy+7 more
doaj +1 more source
Safety Margin Prediction Algorithms Based on Linear Regression Analysis Estimates
In this paper, we consider the problem of approximating the safety margin of a single instance of a technical system based on inaccurate observations at specified time points.
Gurami Tsitsiashvili, Alexandr Losev
doaj +1 more source
XML security protection scheme based on Kerberos authentication and polynomials authorization
With XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years.
Lihong Guo+3 more
doaj +1 more source
Polynomial, Neural Network, and Spline Wavelet Models for Continuous Wavelet Transform of Signals
In this paper a modified wavelet synthesis algorithm for continuous wavelet transform is proposed, allowing one to obtain a guaranteed approximation of the maternal wavelet to the sample of the analyzed signal (overlap match) and, at the same time, a ...
Andrey Stepanov
doaj +1 more source