A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
New wrinkle in dirty paper techniques
2003
Security and Watermarking of Multimedia Contents V
Many of the proposed algorithms use quantization to carry out the embedding process. ...
Although both powerful and simple, recovering the original quantization levels, and hence the embedded data, can be difficult if the image amplitude is modified. ...
These algorithms, in part, owe their inspiration to a paper by Costa, which considers communication under the presence of noise from two disparate noise sources 1 . ...
doi:10.1117/12.477308
dblp:conf/sswmc/BradleyS03
fatcat:jm2eafjv4zevljwap5fas5ffre
Research on Ultrasonic Image Recognition Based on Optimization Immune Algorithm
2021
Computational and Mathematical Methods in Medicine
Compared with the traditional immune algorithm, this paper combines the immune algorithm with the support vector machine, and the optimized immune algorithm can effectively improve the performance of ultrasonic ...
Finally, based on the deficiency of the immune algorithm, it is combined with the support vector machine to form an optimized immune algorithm, which improves the performance of ultrasonic liver image ...
The immune algorithm was inspired by the biological immune mechanism. The earliest immunology dates back more than 200 years. ...
doi:10.1155/2021/5868949
pmid:34055040
pmcid:PMC8149231
fatcat:mgmj5nbghfc2jcaxn4a72j3dsm
A binary-activation, multi-level weight RNN and training algorithm for ADC-/DAC-free and noise-resilient processing-in-memory inference with eNVM
[article]
2020
arXiv
pre-print
We propose a new algorithm for training neural networks with binary activations and multi-level weights, which enables efficient processing-in-memory circuits with embedded nonvolatile memories (eNVM). ...
In particular, we present an RNN-based trigger-word detection PIM accelerator, with detailed hardware noise models and circuit co-design techniques, and validate our algorithm's high inference accuracy ...
Our NNA algorithm is largely inspired by the reparameterization trick [30] and the Gumbel-softmax trick [12, 21] . ...
arXiv:1912.00106v3
fatcat:ppnjkuhnh5eh7bcjsjrsy7cwgm
SOM neural network - a piece of intelligence in disaster management
2009
2009 World Congress on Nature & Biologically Inspired Computing (NaBIC)
Large amounts of various incident records are stored in its databases. The data can be used for mining spatial and temporal anomalies. ...
The method is based on the Kohonen Self Organizing Map (SOM) algorithm. ...
Generating artificial anomalous cases with a Negative Selection Algorithm inspired by the human immune system in combination with a backpropagation neural network [5] falls into this category. ...
doi:10.1109/nabic.2009.5393778
dblp:conf/nabic/KlementS09
fatcat:56sden6gfrazzckkvhzd73i6cy
Proceedings of Workshop AEW10: Concepts in Information Theory and Communications
[article]
2017
arXiv
pre-print
The 10th Asia-Europe workshop in "Concepts in Information Theory and Communications" AEW10 was held in Boppard, Germany on June 21-23, 2017. ...
It is based on a longstanding cooperation between Asian and European scientists. The first workshop was held in Eindhoven, the Netherlands in 1989. ...
, Marc Adrat and Markus Antweiler from the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE in 53343 Wachtberg, Germany for their highly appreciated support of this work ...
arXiv:1707.08567v1
fatcat:4pqbuw2aljglbb4o2x7msoszum
Data Stream Partitioning Algorithms for Big Data Analytics: A Review
2018
AIMS International Journal of Management
This paper takes a critical review of each of the four types of stream clustering algorithms and concludes with some critical discussions, advantages and disadvantages of each type of algorithm as well ...
In several applications like network monitoring, Walmarts are creating huge volume of data, so it is not possible to store such high volume, multidimensional data on physical storage medium i.e. available ...
Acknowledgements We would like to offer the sincere gratitude to the management and the University for providing the constant encouragement and support provided throughout the period of this research work ...
doi:10.26573/2018.12.2.4
fatcat:zhlnpvzdongmjm3vk6ekfphjpq
Rate-distortion methods for image and video compression
1998
IEEE Signal Processing Magazine
In this paper we provide an overview of rate-distortion R-D based optimization techniques and their practical application to image and video coding. ...
We begin with a short discussion of classical rate-distortion theory and then we show h o w in many practical coding scenarios, such as in standards-compliant coding environments, resource allocation can ...
Acknowledgments: We thank the anonymous reviewers, in particular reviewer 1, and Dr. Jong-Won Kim of USC, for their careful reading of the manuscript and their constructive comments. ...
doi:10.1109/79.733495
fatcat:6oxfas5rtfgmtmhxulzksvhn7y
Recent Advances in Artificial Immune Systems: Models and Applications
2011
Applied Soft Computing
The immune system is a remarkable information processing and self learning system that offers inspiration to build artificial immune system (AIS). ...
and dendritic cell algorithms. ...
In [108] Jerne's immune network model is extended and a new classifier based on the new immune network model and Learning Vector Quantization (LVQ) was proposed. ...
doi:10.1016/j.asoc.2010.08.024
fatcat:utgvstpp75e27h3whu7kn2voae
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge
[article]
2020
arXiv
pre-print
Under the guidance of these principles, we propose a framework and an accompanying training algorithm, which are then applied to the AICS'2019 challenge. ...
Some of these principles have been scattered in the literature, but others are proposed in this paper for the first time. ...
and calculate the adversarial samples x i for x i ∈ {x i } N i=1 according to Lines 5-11 in Algorithm 1). ...
arXiv:1812.08108v3
fatcat:4trysg2ipnfj7bspyblvtan2eq
SOMs for Machine Learning
[chapter]
2010
Machine Learning
vector quantization as a technique for verifying that inputs are with their proper (or best suited) clusters. ...
A survey of SOM quality measures can be found in (Pölzlbauer 2004) . www.intechopen.com
Quantization Error Quantization error (QE) is a simple measure used in other fields, including clustering and ...
Considering the growing complexity and serious difficulties of information processing in machine learning, in Part II of the book, the theoretical foundations of machine learning are considered, and they ...
doi:10.5772/9137
fatcat:q46zzlv6urbold5nrbvtxyynty
Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication
[article]
2021
arXiv
pre-print
The system scrambles vocal parameters of a speech signal (loudness, pitch, timbre) using distance-preserving pseudo-random translations and rotations on a hypersphere of parameters. ...
This paper refers to a relatively new concept of sending encrypted speech as pseudo-speech in the audio domain over digital voice communication infrastructures, like 3G cellular network and VoIP. ...
This work is inspired by the notion of distance-preserving [17] encryption stated by Definition 1. ...
arXiv:2102.09809v1
fatcat:r66zxv54gjhenaa6ketzyq2rcu
Logistic Regression of Generic Codebooks for Semantic Image Retrieval
[chapter]
2006
Lecture Notes in Computer Science
Our approach is to model keywords such as 'mountain' and 'city' in terms of visual features that were extracted from images. ...
Initially, the algorithm clusters all visual features extracted from the full imageset, captures its salient structure (e.g. mixture of clusters or patterns) and represents this as a generic codebook. ...
This work was partially funded by the Portuguese Foundation for Science and Technology. ...
doi:10.1007/11788034_5
fatcat:upaiy6xguja6pdsjyk4ouqq3sy
Earprint: Transient Evoked Otoacoustic Emission for Biometrics
2014
IEEE Transactions on Information Forensics and Security
As a physiological outcome from auditory system, TEOAE is immune to replay and falsification attacks In this work, we derive the time-frequency representation of the signal using wavelet analysis, revealing ...
We also introduce a complete framework of the biometric system in both verification and identification modes, as well as a solution to secure sensitive template data. ...
I also gratefully thank former and current members of Biometric Security Laboratory, especially Jiexin Gao and Sahar Javaher Haghighi for their inspiring interaction and encouragement. ...
doi:10.1109/tifs.2014.2361205
fatcat:5aa3mkdj7bepjf5jz6oqvwtti4
2020 Index IEEE Transactions on Cybernetics Vol. 50
2020
IEEE Transactions on Cybernetics
., and Gao, H., Reference Trajectory Reshaping Optimi-zation and Control of Robotic Exoskeletons for Human-Robot Co-Manipulation; TCYB Aug. 2020 3740-3751 Wu, X., Jiang, B., Yu, K., Miao, c., and Chen, ...
., +,
TCYB June 2020 2369-2379
TCYB June 2020
2425-2439
Artificial immune systems
Immune-Endocrine System Inspired Hierarchical Coevolutionary Multiob-
jective Optimization Algorithm for IoT Service ...
., +, TCYB July 2020 3367-3380 Immune-Endocrine System Inspired Hierarchical Coevolutionary Multiobjective Optimization Algorithm for IoT Service. ...
doi:10.1109/tcyb.2020.3047216
fatcat:5giw32c2u5h23fu4drupnh644a
Biometric Inspired Digital Image Steganography
2008
15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008)
., against image processing and other attacks) and capacity of the hidden data (i.e., how much data we can hide in the carrier file), are the main factors that distinguish it from other "sisters-in science ...
It identifies current research problems in this area and discusses how our current research approach could solve some of these problems. ...
Abdulaziz, and Pang [35] , use vector quantization called Linde-Buzo-Gray (LBG) coupled with Block codes known as BCH code and 1-Stage discrete Haar Wavelet transforms. ...
doi:10.1109/ecbs.2008.11
dblp:conf/ecbs/CheddadCCM08
fatcat:eyz2x6garnc3rpabw5nxcwbd2q
« Previous
Showing results 1 — 15 out of 465 results