465 Hits in 5.6 sec

New wrinkle in dirty paper techniques

Brett A. Bradley, John Stach, Edward J. Delp III, Ping W. Wong
2003 Security and Watermarking of Multimedia Contents V  
Many of the proposed algorithms use quantization to carry out the embedding process.  ...  Although both powerful and simple, recovering the original quantization levels, and hence the embedded data, can be difficult if the image amplitude is modified.  ...  These algorithms, in part, owe their inspiration to a paper by Costa, which considers communication under the presence of noise from two disparate noise sources 1 .  ... 
doi:10.1117/12.477308 dblp:conf/sswmc/BradleyS03 fatcat:jm2eafjv4zevljwap5fas5ffre

Research on Ultrasonic Image Recognition Based on Optimization Immune Algorithm

Xueqiang Zeng, Sufen Chen, Chenxi Huang
2021 Computational and Mathematical Methods in Medicine  
Compared with the traditional immune algorithm, this paper combines the immune algorithm with the support vector machine, and the optimized immune algorithm can effectively improve the performance of ultrasonic  ...  Finally, based on the deficiency of the immune algorithm, it is combined with the support vector machine to form an optimized immune algorithm, which improves the performance of ultrasonic liver image  ...  The immune algorithm was inspired by the biological immune mechanism. The earliest immunology dates back more than 200 years.  ... 
doi:10.1155/2021/5868949 pmid:34055040 pmcid:PMC8149231 fatcat:mgmj5nbghfc2jcaxn4a72j3dsm

A binary-activation, multi-level weight RNN and training algorithm for ADC-/DAC-free and noise-resilient processing-in-memory inference with eNVM [article]

Siming Ma, David Brooks, Gu-Yeon Wei
2020 arXiv   pre-print
We propose a new algorithm for training neural networks with binary activations and multi-level weights, which enables efficient processing-in-memory circuits with embedded nonvolatile memories (eNVM).  ...  In particular, we present an RNN-based trigger-word detection PIM accelerator, with detailed hardware noise models and circuit co-design techniques, and validate our algorithm's high inference accuracy  ...  Our NNA algorithm is largely inspired by the reparameterization trick [30] and the Gumbel-softmax trick [12, 21] .  ... 
arXiv:1912.00106v3 fatcat:ppnjkuhnh5eh7bcjsjrsy7cwgm

SOM neural network - a piece of intelligence in disaster management

Petr Klement, Vaclav Snasel
2009 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC)  
Large amounts of various incident records are stored in its databases. The data can be used for mining spatial and temporal anomalies.  ...  The method is based on the Kohonen Self Organizing Map (SOM) algorithm.  ...  Generating artificial anomalous cases with a Negative Selection Algorithm inspired by the human immune system in combination with a backpropagation neural network [5] falls into this category.  ... 
doi:10.1109/nabic.2009.5393778 dblp:conf/nabic/KlementS09 fatcat:56sden6gfrazzckkvhzd73i6cy

Proceedings of Workshop AEW10: Concepts in Information Theory and Communications [article]

Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H.N. de With, Hela Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot Harutyunyan, Masayuki Imanishi (+19 others)
2017 arXiv   pre-print
The 10th Asia-Europe workshop in "Concepts in Information Theory and Communications" AEW10 was held in Boppard, Germany on June 21-23, 2017.  ...  It is based on a longstanding cooperation between Asian and European scientists. The first workshop was held in Eindhoven, the Netherlands in 1989.  ...  , Marc Adrat and Markus Antweiler from the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE in 53343 Wachtberg, Germany for their highly appreciated support of this work  ... 
arXiv:1707.08567v1 fatcat:4pqbuw2aljglbb4o2x7msoszum

Data Stream Partitioning Algorithms for Big Data Analytics: A Review

Hemant Kumar Singh, Vinodani Katiyar
2018 AIMS International Journal of Management  
This paper takes a critical review of each of the four types of stream clustering algorithms and concludes with some critical discussions, advantages and disadvantages of each type of algorithm as well  ...  In several applications like network monitoring, Walmarts are creating huge volume of data, so it is not possible to store such high volume, multidimensional data on physical storage medium i.e. available  ...  Acknowledgements We would like to offer the sincere gratitude to the management and the University for providing the constant encouragement and support provided throughout the period of this research work  ... 
doi:10.26573/2018.12.2.4 fatcat:zhlnpvzdongmjm3vk6ekfphjpq

Rate-distortion methods for image and video compression

A. Ortego, K. Ramchandran
1998 IEEE Signal Processing Magazine  
In this paper we provide an overview of rate-distortion R-D based optimization techniques and their practical application to image and video coding.  ...  We begin with a short discussion of classical rate-distortion theory and then we show h o w in many practical coding scenarios, such as in standards-compliant coding environments, resource allocation can  ...  Acknowledgments: We thank the anonymous reviewers, in particular reviewer 1, and Dr. Jong-Won Kim of USC, for their careful reading of the manuscript and their constructive comments.  ... 
doi:10.1109/79.733495 fatcat:6oxfas5rtfgmtmhxulzksvhn7y

Recent Advances in Artificial Immune Systems: Models and Applications

Dipankar Dasgupta, Senhua Yu, Fernando Nino
2011 Applied Soft Computing  
The immune system is a remarkable information processing and self learning system that offers inspiration to build artificial immune system (AIS).  ...  and dendritic cell algorithms.  ...  In [108] Jerne's immune network model is extended and a new classifier based on the new immune network model and Learning Vector Quantization (LVQ) was proposed.  ... 
doi:10.1016/j.asoc.2010.08.024 fatcat:utgvstpp75e27h3whu7kn2voae

Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge [article]

Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu
2020 arXiv   pre-print
Under the guidance of these principles, we propose a framework and an accompanying training algorithm, which are then applied to the AICS'2019 challenge.  ...  Some of these principles have been scattered in the literature, but others are proposed in this paper for the first time.  ...  and calculate the adversarial samples x i for x i ∈ {x i } N i=1 according to Lines 5-11 in Algorithm 1).  ... 
arXiv:1812.08108v3 fatcat:4trysg2ipnfj7bspyblvtan2eq

SOMs for Machine Learning [chapter]

Iren Valova, Derek Beaton, Daniel MacLe
2010 Machine Learning  
vector quantization as a technique for verifying that inputs are with their proper (or best suited) clusters.  ...  A survey of SOM quality measures can be found in (Pölzlbauer 2004) . Quantization Error Quantization error (QE) is a simple measure used in other fields, including clustering and  ...  Considering the growing complexity and serious difficulties of information processing in machine learning, in Part II of the book, the theoretical foundations of machine learning are considered, and they  ... 
doi:10.5772/9137 fatcat:q46zzlv6urbold5nrbvtxyynty

Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication [article]

Piotr Krasnowski and Jerome Lebrun and Bruno Martin
2021 arXiv   pre-print
The system scrambles vocal parameters of a speech signal (loudness, pitch, timbre) using distance-preserving pseudo-random translations and rotations on a hypersphere of parameters.  ...  This paper refers to a relatively new concept of sending encrypted speech as pseudo-speech in the audio domain over digital voice communication infrastructures, like 3G cellular network and VoIP.  ...  This work is inspired by the notion of distance-preserving [17] encryption stated by Definition 1.  ... 
arXiv:2102.09809v1 fatcat:r66zxv54gjhenaa6ketzyq2rcu

Logistic Regression of Generic Codebooks for Semantic Image Retrieval [chapter]

João Magalhães, Stefan Rüger
2006 Lecture Notes in Computer Science  
Our approach is to model keywords such as 'mountain' and 'city' in terms of visual features that were extracted from images.  ...  Initially, the algorithm clusters all visual features extracted from the full imageset, captures its salient structure (e.g. mixture of clusters or patterns) and represents this as a generic codebook.  ...  This work was partially funded by the Portuguese Foundation for Science and Technology.  ... 
doi:10.1007/11788034_5 fatcat:upaiy6xguja6pdsjyk4ouqq3sy

Earprint: Transient Evoked Otoacoustic Emission for Biometrics

Yuxi Liu, Dimitrios Hatzinakos
2014 IEEE Transactions on Information Forensics and Security  
As a physiological outcome from auditory system, TEOAE is immune to replay and falsification attacks In this work, we derive the time-frequency representation of the signal using wavelet analysis, revealing  ...  We also introduce a complete framework of the biometric system in both verification and identification modes, as well as a solution to secure sensitive template data.  ...  I also gratefully thank former and current members of Biometric Security Laboratory, especially Jiexin Gao and Sahar Javaher Haghighi for their inspiring interaction and encouragement.  ... 
doi:10.1109/tifs.2014.2361205 fatcat:5aa3mkdj7bepjf5jz6oqvwtti4

2020 Index IEEE Transactions on Cybernetics Vol. 50

2020 IEEE Transactions on Cybernetics  
., and Gao, H., Reference Trajectory Reshaping Optimi-zation and Control of Robotic Exoskeletons for Human-Robot Co-Manipulation; TCYB Aug. 2020 3740-3751 Wu, X., Jiang, B., Yu, K., Miao, c., and Chen,  ...  ., +, TCYB June 2020 2369-2379 TCYB June 2020 2425-2439 Artificial immune systems Immune-Endocrine System Inspired Hierarchical Coevolutionary Multiob- jective Optimization Algorithm for IoT Service  ...  ., +, TCYB July 2020 3367-3380 Immune-Endocrine System Inspired Hierarchical Coevolutionary Multiobjective Optimization Algorithm for IoT Service.  ... 
doi:10.1109/tcyb.2020.3047216 fatcat:5giw32c2u5h23fu4drupnh644a

Biometric Inspired Digital Image Steganography

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt
2008 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008)  
., against image processing and other attacks) and capacity of the hidden data (i.e., how much data we can hide in the carrier file), are the main factors that distinguish it from other "sisters-in science  ...  It identifies current research problems in this area and discusses how our current research approach could solve some of these problems.  ...  Abdulaziz, and Pang [35] , use vector quantization called Linde-Buzo-Gray (LBG) coupled with Block codes known as BCH code and 1-Stage discrete Haar Wavelet transforms.  ... 
doi:10.1109/ecbs.2008.11 dblp:conf/ecbs/CheddadCCM08 fatcat:eyz2x6garnc3rpabw5nxcwbd2q
« Previous Showing results 1 — 15 out of 465 results