咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 8 册 图书
  • 5 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 29 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 8 篇 光学工程
    • 6 篇 测绘科学与技术
    • 5 篇 电子科学与技术(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 1 篇 安全科学与工程
  • 34 篇 理学
    • 30 篇 数学
    • 24 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 17 篇 医学
    • 17 篇 临床医学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...

主题

  • 9 篇 pattern recognit...
  • 8 篇 image compressio...
  • 7 篇 encryption
  • 4 篇 neural networks
  • 4 篇 image coding
  • 3 篇 data compression
  • 3 篇 adaptive pattern...
  • 2 篇 image encryption
  • 2 篇 applications of ...
  • 2 篇 arithmetic codin...
  • 2 篇 entropy
  • 2 篇 functional analy...
  • 2 篇 computer imaging...
  • 2 篇 cryptography
  • 1 篇 internet of thin...
  • 1 篇 data encryption ...
  • 1 篇 computer science
  • 1 篇 intraoperative p...
  • 1 篇 symmetric key cr...
  • 1 篇 causality

机构

  • 4 篇 university of fl...
  • 4 篇 univ florida dep...
  • 1 篇 univ latvia fac ...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 lebanese amer un...
  • 1 篇 department of el...
  • 1 篇 inst space sci b...
  • 1 篇 shinshu univ fac...
  • 1 篇 department of ma...
  • 1 篇 hohai univ dept ...
  • 1 篇 department of ma...
  • 1 篇 univ leicester u...
  • 1 篇 indian inst tech...
  • 1 篇 frontier technol...
  • 1 篇 univ massachuset...
  • 1 篇 cidetec ipn aven...
  • 1 篇 sandia natl labs...
  • 1 篇 department of ar...

作者

  • 6 篇 schmalz mark s.
  • 5 篇 ritter gerhard x...
  • 4 篇 mark steven schm...
  • 2 篇 astola jaakko t.
  • 2 篇 hayden eric
  • 1 篇 gervasi osvaldo
  • 1 篇 hassan gamal a.
  • 1 篇 zanarini m.
  • 1 篇 shen yao
  • 1 篇 xu haiyan
  • 1 篇 mitrea m.
  • 1 篇 hayden eric t.
  • 1 篇 musatenko yurij ...
  • 1 篇 schmalz ms
  • 1 篇 kamble shailesh ...
  • 1 篇 uchill j
  • 1 篇 pujol j
  • 1 篇 kurashov vitalij...
  • 1 篇 bartolini f
  • 1 篇 kalienky d

语言

  • 59 篇 英文
检索条件"任意字段=Mathematics of Data/Image Pattern Coding, Compression, and Encryption with Applications XIII"
59 条 记 录,以下是11-20 订阅
排序:
Noise Tolerant Dendritic Lattice Associative Memories
Noise Tolerant Dendritic Lattice Associative Memories
收藏 引用
Conference on mathematics of data/image pattern coding, compression, and encryption with applications xiii
作者: Ritter, Gerhard X. Schmalz, Mark S. Hayden, Eric Tucker, Marc Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA
Linear classifiers based on computation over the real numbers R (e. g., with operations of addition and multiplication) denoted by (R, +, x), have been represented extensively in the literature of pattern recognition.... 详细信息
来源: 评论
image registration error analysis using pattern recognition algorithms
Image registration error analysis using pattern recognition ...
收藏 引用
Conference on mathematics of data/image coding, compression, and encryption with applications XII
作者: Duraisamy, Prakash Shen, Yao Yuan, Xiaohui Univ N Texas Denton TX 76203 USA
image segmentation is one of the important applications in computer vision applications. In this paper, we present an image registration method that stiches multiple images into one complete view. Also, we demonstrate... 详细信息
来源: 评论
Massively Parallel Computation of Lattice Associative Memory Classifiers on Multicore Processors
Massively Parallel Computation of Lattice Associative Memory...
收藏 引用
Conference on mathematics of data/image pattern coding, compression, and encryption with applications xiii
作者: Ritter, Gerhard X. Schmalz, Mark S. Hayden, Eric T. Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA
Over the past quarter century, concepts and theory derived from neural networks (NNs) have featured prominently in the literature of pattern recognition. Implementationally, classical NNs based on the linear inner pro... 详细信息
来源: 评论
Algorithms for Adaptive Nonlinear pattern Recognition
Algorithms for Adaptive Nonlinear Pattern Recognition
收藏 引用
Conference on mathematics of data/image pattern coding, compression, and encryption with applications xiii
作者: Schmalz, Mark S. Ritter, Gerhard X. Hayden, Eric Key, Gary Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA Frontier Technol Inc Altamonte Springs FL 32701 USA
In Bayesian pattern recognition research, static classifiers have featured prominently in the literature. A static classifier is essentially based on a static model of input statistics, thereby assuming input ergodici... 详细信息
来源: 评论
Implementation IDEA algorithm for image encryption
Implementation IDEA algorithm for image encryption
收藏 引用
Conference on mathematics and applications of data/image coding, compression, and encryption III
作者: Dang, PP Chau, PM Univ Calif San Diego Dept Elect & Comp Engn La Jolla CA 92093 USA
In this paper, we present an implementation of the IDEA algorithm for image encryption. The image encryption is incorporated into the compression algorithm for transmission over a data network, in the proposed method,... 详细信息
来源: 评论
Generation of lattice independent vector sets for pattern recognition applications
Generation of lattice independent vector sets for pattern re...
收藏 引用
Conference on mathematics of data/image pattern Recongnition, compression, coding, and encryption X, with applications
作者: Urcid-S., Gonzalo Valdiviezo-N., Juan-Carlos INAOE Dept Opt Puebla 72000 Mexico
Lattice independence and strong lattice independence of a set of pattern vectors are fundamental mathematical proper-ties that lie at the core of pattern recognition applications based on lattice theory. Specifically,... 详细信息
来源: 评论
Benchmarking techniques for evaluation of compression transform performance in ATR applications
Benchmarking techniques for evaluation of compression transf...
收藏 引用
7th Conference on mathematics of data/image coding, compression, and encryption
作者: Schmalz, MS Univ Florida Dept Comp & Informat Sci & Engn Gainesville FL 32611 USA
image compression is increasingly employed in applications such as medical imaging, for reducing data storage requirement, and Internet video transmission, to effectively increase channel bandwidth. Similarly, militar... 详细信息
来源: 评论
data encryption scheme with extended artithmetic coding
Data encryption scheme with extended artithmetic coding
收藏 引用
4th Conference on mathematics of image and data coding, compression, and encryption
作者: Ishibashi, H Tanaka, K Shinshu Univ Fac Engn Nagano 3808553 Japan
In this work, we extend arithmetic coding and present a data encryption scheme that achieves data compression and data security at the same time. This scheme is based on a chaotic dynamics, which makes use of the fact... 详细信息
来源: 评论
Recovery of 3-D human posture from double views
Recovery of 3-D human posture from double views
收藏 引用
Conference on mathematics of data/image coding, compression, and encryption VI, with applications
作者: Sun, Y Li, MH He, YH Dalian Univ Technol Sch Elect & Informat Engn Dalian 116024 Peoples R China
The 3-D estimation of human motion captured by a video camera(s) is becoming a challenging scientific task. In this C, paper, two important problems are addressed: the acquisition of 3-D coordinates of human's bod... 详细信息
来源: 评论
Combined data encryption and compression using chaos functions
Combined data encryption and compression using chaos functio...
收藏 引用
7th Conference on mathematics of data/image coding, compression, and encryption
作者: Bose, R Pathak, S Indian Inst Technol Dept Elect Engn New Delhi 110016 India
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitabl... 详细信息
来源: 评论