Neural net architectures, with a hidden layer or functional links, have been utilized to generate prediction for one-dimensional (1-D) differential pulse code modulation (DPCM), applied to still image coding. In this ...
Neural net architectures, with a hidden layer or functional links, have been utilized to generate prediction for one-dimensional (1-D) differential pulse code modulation (DPCM), applied to still image coding. In this approach, the predictor is designed by supervised training based on a typical sequence of pixel values; i.e., the values of the coefficients of the predictor are determined by training on examples. Nonlinear as well as linear correlations are exploited. computer simulation experiments have been carried out to evaluate the resulting performance. At a transmission rate of 1 bit/pixel, for the images Lena and Baboon, the 1-D neural network DPCM provides a 4.17- and 3.74-dB improvement in peak SNR, respectively, over the standard linear DPCM system.
A multiresolution surface modeling technique is presented. Several registered range views obtained from different viewpoints are first integrated into a nonredundant surface triangulation. The integration technique is...
详细信息
A useful measure is presented for comparison of distinct cryptosystems, including (i) the RSA algorithm, (ii) EIGamal algorithm, (iii) a cryptosystem based on radio background noise (RBN), and (iv) a new cryptosystem ...
详细信息
This paper examines particles in Particle Swarm Optimization (PSO) in terms of situated agents to improve control of the long term behaviour of particles as required for cognitive machines. In PSO, the particles lack ...
详细信息
In this paper, we propose a new intelligent, robust and adaptive digital watermarking technique for colour images based on the combination of discrete wavelet transform (DWT), human visual system (HVS) model and gener...
详细信息
In this article, two new comparison principles for studying positive invariance and stability of linear and nonlinear discrete-time systems are presented. First, a general comparison principle enabling one to determin...
详细信息
This paper presents specially designed tests performed in a cryptosystem based on chaotic continuous cellular automata (CCA). The degree of the cryptosystem security is evaluated by taking two approaches: (i) stationa...
详细信息
In September 2009, the IEEE Board of Directors approved the new IEEE tagline - Advancing Technology for Humanity - as recommended by the IEEE Public Visibility Committee. Aligned with the IEEE tagline, IEEE Standards ...
详细信息
The purpose of this paper is to present a modified version of the ant colony system (ACS) algorithm. The modified ACS algorithm is faster and it has a better performance than the standard ACS algorithm. We have establ...
详细信息
The purpose of this paper is to present a modified version of the ant colony system (ACS) algorithm. The modified ACS algorithm is faster and it has a better performance than the standard ACS algorithm. We have established a set of local rules/modifications, that do improve the performance of the standard ACS and these are reported here.
The interaction of a soliton of the Nonlinear Schrodinger Equation (NSE) with a weak sinusoidal wave packet is treated analytically, The second-order soliton solution containing the original soliton and a perturbing s...
详细信息
The interaction of a soliton of the Nonlinear Schrodinger Equation (NSE) with a weak sinusoidal wave packet is treated analytically, The second-order soliton solution containing the original soliton and a perturbing soliton is expanded to first order in the amplitude of the perturbating soliton, From this expansion, one obtains the associate function of Gordon [4] and a continuous change of position and phase of the perturbed soliton, One finds that the soliton experiences a second-order change of velocity under the influence of the perturbation. This result is then used to derive the displacement due to a wave packet of general shape, which is also confirmed by computer simulation.
暂无评论