Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking
|
|
- Johnathan Logan
- 6 years ago
- Views:
Transcription
1 Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract - Ths paper proposes a novel mage authentcaton scheme n the DWT doman. The scheme uses a sem-fragle atermark to detect and precsely locate malcous tamperng regon n mages. The avelet coeffcents selected for embeddng are randomly permuted th a secret key, achevng hgh securty. A bt of the atermark s embedded n a group of coeffcents by means of quantzaton. The expermental results sho, that our algorthm acheves good mage qualty and hgh tamperng detecton resoluton at a lo atermark payload, compared to block-based authentcaton schemes. The atermark s protected aganst local attacks. We have also conducted experments to demonstrate the robustness of the atermark aganst mld to moderate JPEG compresson. Keyord - Multmeda securty, Dgtal atermarkng, Random permutaton, Image authentcaton I. INTRODUCTION II. Dgtal atermarkng can be classfed nto three dfferent categores: robust, fragle and sem-fragle ater-markng. A robust atermark should be able to resst ntentonal or unntentonal manpulatons, hle a fragle atermark s ntended to be destroyed even after the smallest unntentonal manpulaton. Some mportant applcatons for robust atermarkng are fnger prntng, data mnng and copyrght protecton [1, 2]. The thrd category, sem-fragle atermarkng [3, 4], uses atermarks that have the ablty to resst unntentonal manpulatons caused by common mage processng operatons lke JPEG compresson and are fragle aganst ntentonal, malcous manpulatons. The man applcaton feld of fragle and sem-fragle atermarkng s mage and vdeo content authentcaton. Ths paper focuses on usng a sem-fragle atermark for mage authentcaton. Most of the mage authentcaton technques use a block-based concept n the spatal, Dscrete Cosne Transform (DCT) or avelet doman [5, 6] for detectng the tampered regons n the mage. The orgnal mage s parttoned nto blocks, and each block s embedded th ts on atermark usng a secret key. Hoever, most of these schemes are vulnerable to counterfetng attacks and they cannot dscrmnate beteen ntentonal tamperng and unntentonal mage processng dstortons [7, 8]. In such approaches, the tamper detecton resoluton s lmted to the block sze. Smaller block szes and hgher atermark payloads are necessary to mprove the detecton resoluton, resultng n a consderable degradaton of the mage qualty. A specfc attack aganst mage authentcaton s the collage attack, ntroduced by Hollman and Memon n [9]. Usng ths attack, a counterfeter can combne ndependently authentcated blocks to produce forged content. Ths attack s thus undetectable by conventonal block-based atermarkng technques. The scheme proposed n ths paper focuses on elmnatng the drabacks of block-based schemes, usng a Dscrete Wavelet Transform (DWT) based approach and random permutaton of avelet coeffcents. Our algorthm mproves the tamper detecton localzaton; unlke conventonal block-based methods, the exact tampered regon s detected. The atermark payload s sgnfcantly loered, ncreasng the mage qualty. The algorthm can also dstngush beteen ntentonal tamperng and unntentonal mld to moderate JPEG compresson. Mathematcal morphology can be used to mprove the detecton results [10, 11]. The remander of ths paper s organzed as follos. In Secton 2 e present the proposed mage authentcaton scheme n the avelet doman, shong the block dagrams of the atermark encoder and decoder and detalng the steps of the algorthm. Secton 3 contans the expermental results and performances of the proposed scheme and conclusons are gven n Secton 4. THE PROPOSED IMAGE AUTHENTICATION SCHEME IN THE DWT DOMAIN Ths secton descrbes the proposed mage authentcaton scheme. The block dagram of the atermark encoder s shon n Fg. 1. The atermark embeddng process s descrbed n the follong: 1. The orgnal, gray scale mage s transformed nto the avelet doman usng a 2D-DWT decomposton on L resoluton levels. IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2878
2 Fgure 1. Block dagram of the atermark encoder 2. The detal avelet coeffcents from the LHn, HLn and HHn Wavelet sub-bands of resoluton level n L are selected. For example, n Fg. 2, the coeffcents of the second Wavelet decomposton are chosen for further processng. Selectng hgher resoluton sub-bands for atermark embeddng gves a better tamperng localzaton, but decreases the reslence of the algorthm to common, unntentonal mage processng operatons. LL3 LH3 HL3 HH3 HL2 HL1 LH2 HH2 LH1 HH1 Fgure 2. Wavelet decomposton on L = 3 resoluton levels 3. The selected avelet coeffcents are concatenated n a 1D vector S and randomly permuted usng a secret key K nto a ne vector S. Ths process assures that coeffcents correspondng to the same spatal locaton ll be separated n S. 4. The sequence S of permuted coeffcents s dvded nto groups of d coeffcents. Parameter d controls the atermark payload of the proposed scheme. A atermark bt ll be embedded n every group of d coeffcents. A smaller group sze ll result n a bgger atermark payload and thus n a hgher degradaton of the mage qualty and a smaller sze of the maxmal localzable tampered area, but ll not decrease the detecton resoluton of the scheme. 5. The atermark, a bnary random sequence, s generated and serves as the authentcaton code. has the same length as the number of avelet coeffcent groups. 6. The eghted mean m of every group of permuted avelet coeffcents s obtaned usng the follong equaton: d j 1 ( ) (1) m c j j 1 Where c (j) denotes the j th coeffcent of group. The eght (-1) j s used to make the scheme more robust to common mage processng operatons that, n most cases, change the entre mage and ould not modfy the eghted mean. m 7. The atermarked mean s obtaned by quantzaton of m to the nearest even or odd quantzaton level accordng to the value of the correspondng atermark bt, usng the follong equaton: m / * mod 2 / / * mod 2 / m Q Q f m Q m Q Q Q f m Q (2) IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2879
3 here [ ] s the nteger part operator and mod2 s the remander after dvson by For every group of coeffcents, the eghted mean m s changed to the atermarked mean by modfyng the avelet coeffcent s,max(j) th the hghest absolute value. Because of the random permutaton operaton every group should have at least one coeffcent th hgh absolute value. The updatng of s, max(j) s done as follos: ( ) ( ) ( ) ( ( )) ( ) (3) ( ) s the atermarked coeffcent and 1 f x 0 sgn( x) 1 f x 0 9. After updatng the coeffcents th the hghest absolute value from every group, the nverse permutaton s appled usng the secret key K. 10. Fnally, the Inverse 2D-DWT s calculated to obtan the atermarked mage. The block dagram of the atermark decoder and mage authentcaton s shon n Fg. 3. The atermark extracton process and mage authentcaton s descrbed n follong: 1. The atermarked, possbly tampered mage s transformed nto the avelet doman usng 2D-DWT decomposton on L resoluton levels. 2. The detal avelet coeffcents from the LHn, HLn and HHn Wavelet sub-bands are selected for atermark extracton. 3. The selected avelet coeffcents are concatenated. Usng a secret key K, the same random permutaton s performed. 4. The sequence of permuted coeffcents s dvded nto groups of d coeffcents. 5. The eghted mean m of every group of coeffcents s calculated usng Eq. (1). 6. A atermark bt ' ' s extracted from the eghted mean of every group of d coeffcents usng Eq. (5). ( ) (5) m (4) Fgure 3. Block dagram of the atermark decoder and mage authentcaton To authentcate the mage the follong step need to be done: 1. Frst, the orgnal atermark s locally generated. If the extracted atermark matches the orgnal one then the mage s authentc. If not, the follong steps ll determne f the mage as tampered. ' 2. If a bt of the extracted atermark does not match the orgnal one, all coeffcents belongng to group are declared as potentally tampered. 3. All coeffcents are permuted back to ther orgnal poston usng the nverse permutaton th the secret key. The coeffcents declared as potentally tampered should be no spread all over the sub-bands. The actual tampered regons IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2880
4 III. should have a hgh densty of flagged coeffcents. The other flagged coeffcents should be solated and dstrbuted lke random nose. They are false postves and can be clamed as authentc. 4. For a selected resoluton level n e ll have three sub-bands, LHn, HLn and HHn, th flagged and non-flagged coeffcents. We ll construct a bnary authentcaton matrx A of the same sze as the selected sub-bands. A(x,y) = 1 f there s a flagged coeffcent at the same poston (x,y) n any of the HL, LH, or HH selected sub-bands. 5. The solated 1 bts n the authentcaton matrx A ll be removed through flterng. 6. Locatons ncorrectly flagged as tampered are further elmnated by successve eroson and dlaton, usng a dsk of radus R pxels and a square of sze S x S as structural elements. The 1 bts n the fltered and eroded authentcaton matrx should no correctly ndcate the tampered locatons. 7. The flagged postons n A are then mapped back to the spatal doman to ndcate the actual tampered locatons. The senstvty of the tamperng detecton can be adapted by selectng the quantzaton step sze Q, choosng the flter sze n step 5 and the sze of the structural element used for eroson and dlaton n step 6 of the authentcaton process. A larger Q ll ncrease the senstvty, but ll decrease the perceptual qualty of the atermarked mage. A larger flter or a bgger structural element for eroson and dlaton ll reduce the senstvty, but ll also reduce the probablty of false alarms as a result of common mage processng operatons. A trade-off has to be found for specfc applcatons. RESULTS AND ANALYSIS To determne the performances of the proposed mage authentcaton scheme for several mages of dfferent szes ere used. We have evaluated our algorthms n terms of mage qualty, localzaton capablty of the tamperng. Table 1 shos the mage qualty and decodng results of the proposed method for dfferent choces of the avelet resoluton level n for atermark embeddng, quantzaton step sze Q and group sze d, here PSNR s the mean Peak Sgnal to Nose Rato. The PSNR values are above 40 db, except Q=12 (d = 4), Q =16 (d = 4 and d = 8) and Q =20 (d =4, d = 8 and d = 12), here small dstorton are also vsble n the atermarked mages. Quantzaton Level (Q) Table 1 Mean PSNR values for the atermarked mages Image of lena.jpg Image of cameraman.tf Coeffcent N = 1 N = 2 N = 1 N = 2 group sze (d) (PSNR) (PSNR) (PSNR) (PSNR) In Fg. 4 e compare our technque th avelet decomposton level n = 1 and d = 4, d = 8, d = 12 and d = 16. We also measure the PSNR value on dfferent quantzaton level. We can see that our approach acheves very hgh mage qualty th respect to ncreasng group sze (d) and decreasng quantzaton level (Q). IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2881
5 Fgure III. Graph for qualty of the atermarked mages for dfferent group szes. Next, e test the capacty of our approach to detect the tamperng. For ths purpose, n the mage n Fg.5a shos the orgnal nput mage and Fg.5b shos the atermarked mage. Frst e embed the atermark n the frst Wavelet decomposton level (n = 1), usng groups of d = 8 avelet coeffcents and the quantzaton step sze Q =8. Fg.5c shos the potentally tampered locatons n the mage before refnng the authentcaton result through flterng. (a) (b) (c) (d) IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2882
6 (e) (f) IV. Fgure 5. (a) orgnal mage, (b) atermarked mage after dong random permutaton and addng atermark bt (c) authentcated mage before flterng for n =1, d = 8 and Q = 8, (d) authentcated mage after flterng and mathematcal morphology operatons for n =1, d = 8 and Q = 8, (e) authentcated mage before flterng for n =2, d = 8 and Q = 8, (f) authentcated mage after flterng and mathematcal morphology operatons for n = 2, d = 8 and Q = 8. Then, e flter the authentcaton matrx th a cross shaped bnary flter of sze F = 5. The fltered authentcaton matrx s then successvely eroded usng a dsk of radus R = 1 and a square of sze 3 x 3 as structural elements. Fg. 5d shos the refned authentcaton result after flterng and eroson operatons. In Fg. 5e and f e depct the authentcaton results before and after refnement usng the follong parameters: n =2, d = 8 and Q = 8. CONCLUSION In ths paper e have proposed a ne mage authentcaton scheme usng a sem-fragle atermark that can detect and locate malcous tamperng n mages. The embeddng and extracton of the authentcaton atermark s done n the DWT doman. Our technque acheves hgh mage qualty and hgh tamperng detecton resoluton at a lo atermark payload usng random permutaton of the avelet coeffcents before embeddng, the atermark s also protected aganst local attacks. REFERENCES [1] R.O. Preda, D.N. Vzreanu, Robust avelet-based vdeo atermarkng scheme for copyrght protecton usng the human vsual system, Journal of Electronc Imagng, vol. 20, pp , [2] R.O. Preda, D.N. Vzreanu, A robust dgtal atermarkng scheme for vdeo copyrght protecton n the avelet doman, Measurement, Measurement, vol. 43, pp , [3] Preda, R.O.; Vzreanu, D.N., "Blnd Watermarkng Capacty Analyss of MPEG2 Coded Vdeo," 8th Internatonal Conference on Telecommuncatons n Modern Satellte, Cable and Broadcastng Servces, pp. 465,468, Sept [4] A. Pva, F. Bartoln, R. Caldelly, Self recovery authentcaton of mages n DWT doman, Internatonal Journal of Image and Graphcs, vol. 5, pp , [5] C.-T. L, H. S, Wavelet-based fragle atermarkng scheme for mage authentcaton, Journal of Electronc Imagng, vol. 16, pp. 1-9, [6] A.H. Ouda, M.R. El-Sakka, Localzaton and securty enhancement of blockbased mage authentcaton, IEEE Internatonal Conference on Image Processng, vol. 1, pp , September 2005 [7] C. Fe, D. Kundur, R.H. Kong, Analyss and desgn of secure atermark-based authentcaton systems, IEEE Transactons on Informaton Forenscs and Securty, vol. 1, pp , 2006 [8] L.P. Frere, P. Comesana, J.R.T. Pastorza, F.P. Gonzalez, Watermarkng securty: a survey, LNCS Transactons on Data Hdng and Multmeda Securty, vol. 1, pp , [9] M. Hollman, N. Memon, Counterfetng attacks on oblvous block-se ndependent nvsble atermarkng schemes, IEEE Transactons Image Processng, vol. 9, pp , [10] D. N Vzreanu, S. Halunga, G. Marghescu, Morphologcal skeleton decomposton nterframe nterpolaton method, Journal of Electronc Imagng, vol. 19, pp. 1-3, [11] R. M Udrea, D.N. Vzreanu, Iteratve generalzaton of morphologcal skeleton, Journal of Electronc Imagng, vol. 16, pp. 1-3, IJEDR Internatonal Journal of Engneerng Development and Research (.jedr.org) 2883
IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING
U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel
More informationRobust Block Selection for Watermarking Video Streams
Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng
More informationAn Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold
Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty
More informationCONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES
he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence
More informationSide-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationInverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract
More informationA Novel and Secure technique for image. Steganography using DWT
Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton
More informationBLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS
BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationA High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode
A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute
More informationA New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution
9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the
More informationProposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking
Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt.
More informationImproved Error Detection in the JPEG2000 Codec
Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence
More informationSpread Spectrum based M-ary Modulated Robust Image Watermarking
54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of
More informationA Novel DCT-based Approach for Secure Color Image Watermarking
A Novel DCT-based Aroach for Secure Color Image Watermarkng Narges Ahmd Amrkabr Unversty of Technology n_ahmd@ce.aut.ac.r Reza Safabakhsh Amrkabr Unversty of Technology safa@ce.aut.ac.r Abstract In ths
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationSteganography in JPEG2000 Compressed Images
824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationNew Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.
Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationFFT Spectrum Analyzer
THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------
More informationA Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method
A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,
More informationDISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT
DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department
More informationMulti-focus Image Fusion Using Spatial Frequency and Genetic Algorithm
0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,
More informationA study of turbo codes for multilevel modulations in Gaussian and mobile channels
A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,
More informationThe Application of Interpolation Algorithms in OFDM Channel Estimation
The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School
More informationRecognition of Low-Resolution Face Images using Sparse Coding of Local Features
Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationOptimizing a System of Threshold-based Sensors with Application to Biosurveillance
Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?
More informationantenna antenna (4.139)
.6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,
More informationLSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications
Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More informationNATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985
NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationA Robust Feature Extraction Algorithm for Audio Fingerprinting
A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry
More informationMulti-Level Halftoning by IGS Quantization
Journal of Sgnal and Informaton Processng, 2013, 4, 351-358 Publshed Onlne ovember 2013 (http://www.scrp.org/journal/jsp) http://dx.do.org/10.4236/jsp.2013.44044 351 Mult-Level Halftonng by IGS Quantzaton
More informationMEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM
Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET
More informationEstimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels
Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)
More informationTHE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM
THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of
More information29. Network Functions for Circuits Containing Op Amps
9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can
More informationReview: Our Approach 2. CSC310 Information Theory
CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages
More informationImage analysis using modulated light sources Feng Xiao a*, Jeffrey M. DiCarlo b, Peter B. Catrysse b, Brian A. Wandell a
Image analyss usng modulated lght sources Feng Xao a*, Jeffrey M. DCarlo b, Peter B. Catrysse b, Bran A. Wandell a a Dept. of Psychology, Stanford Unversty, CA 9435, USA b Dept. of Electrcal Engneerng,
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationRobust Filter Design based on Generalized Maximum-Likelihood Estimation
Robust Flter Desgn based on Generalzed Maxmum-Lkelhood Estmaton STEFA LEISCHER, ROBERT KLISKI, HOLGER HUTZELMA, RUDI KORR Fraunhofer Insttute for Communcaton Systems Hansastr. 3, 8686 Munch GERMAY Abstract:
More informationDesign and Implementation of DDFS Based on Quasi-linear Interpolation Algorithm
Desgn and Implementaton of DDFS Based on Quas-lnear Interpolaton Algorthm We Wang a, Yuanyuan Xu b and Hao Yang c College of Electroncs Engneerng, Chongqng Unversty of Posts and Telecommuncatons, Chongqng
More informationRejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationPROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN
PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The
More informationPerformance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking
Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 250-7988 Volume 8 (206) pp. 057-066 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance Comparson of Product
More informationAnalysis and Characterization of JPEG 2000 Standard for Imaging Devices
S. Battato et al.: Analyss and Characterzaton of JPEG 2 Standard for Imagng Devces Analyss and Characterzaton of JPEG 2 Standard for Imagng Devces S. Battato 1, A. R. Bruna 2, A. Buem 2 and A. Castorna
More informationApplication of Intelligent Voltage Control System to Korean Power Systems
Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon
More informationLow Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery
017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang
More informationDigital Transmission
Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal
More informationA Current Differential Line Protection Using a Synchronous Reference Frame Approach
A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,
More informationTime-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock
Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty
More informationDouble-lock for image encryption with virtual optical wavelength
Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca
More informationError Probability of RS Code Over Wireless Channel
Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department
More informationRange-Based Localization in Wireless Networks Using Density-Based Outlier Detection
Wreless Sensor Network, 010,, 807-814 do:10.436/wsn.010.11097 Publshed Onlne November 010 (http://www.scrp.org/journal/wsn) Range-Based Localzaton n Wreless Networks Usng Densty-Based Outler Detecton Abstract
More informationFigure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13
A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng
More informationPOWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION
POWER-DISTORTION OPTIMIZATION FOR WIRELESS IMAGE/VIDEO SOFTCAST BY TRANSFORM COEFFICIENTS ENERGY MODELING WITH ADAPTIVE CHUNK DIVISION Ruqn Xong 1, Feng Wu, Xaopeng Fan 3, Chong Luo, Swe Ma 1, Wen Gao
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationDVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels
DVB-T/H Dgtal Televson Transmsson and ts Smulaton over Rcean and Raylegh Fadng Channels Ladslav Polák, Tomáš Kratochvl Department of Rado Electroncs, Brno Unversty of Technology, Purkyňova 118, 612 Brno,
More informationcommunications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.
Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal
More informationRC Filters TEP Related Topics Principle Equipment
RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)
More informationPerformance Analysis of the Weighted Window CFAR Algorithms
Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,
More informationEvaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator
Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research
More informationGraph Method for Solving Switched Capacitors Circuits
Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586
More informationEncoder and Decoder Side Global and Local Motion Estimation for Distributed Video Coding
Encoder and Decoder Sde Global and Local Moton Estmaton for Dstrbuted Vdeo Codng Frederc Dufaux, Touradj Ebrahm MultMeda Sgnal Processng Group Ecole Polytechnque Fédérale de Lausanne (EPFL) CH-1015 Lausanne,
More informationMulti-transmitter aperture synthesis with Zernike based aberration correction
Mult-transmtter aperture synthess wth Zerne based aberraton correcton Bahadr Guntur,, Davd J Rabb, 2 and Douglas F Jameson 2 Lousana State Unversty, Dept of Electrcal & Computer Engneerng, Baton Rouge,
More informationArchive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking. M. Khademi
KHADEMI: CHAEL CAPACITY AALYSIS OF SPREAD SPECTRUM AUDIO WATERMARKIG Channel Capacty Analyss of Spread Spectrum Audo Watermarkng M. Khadem Abstract In ths paper, nformaton-theoretc analyss of spread spectrum
More informationMotion Vector Recovery for Real-Time H.264 Video Streams
Internatonal J. of Recent Trends n Engneerng and Technology, Vol., No., May 2 Moton Vector Recovery for Real-Tme H.264 Vdeo Streams Kavsh Seth, Tummala Rajesh, V. Kamakot 2, and S. Srnvasan Dept. of Electrcal
More informationSPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES
Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,
More informationDelay Constrained Fuzzy Rate Control for Video Streaming over DVB-H
Delay Constraned Fuzzy Rate Control for Vdeo Streamng over DVB-H Mehd Rezae, Moncef Gabbouj, 3 med Bouazz,, Tampere Unversty of Technology, 3 Noka Research Center, Tampere, Fnland mehd.rezae@tut.f, moncef.gabbouj@tut.f,
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationA Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization
ISSN (Prnt) : 39-863 ISSN (Onlne) : 975-44 D. Yugandhar et al. / Internatonal Journal of Engneerng and Technology (IJET) A Heurstc Speech De-nosng wth the ad of Dual Tree Complex Wavelet Transform usng
More informationIIR Filters Using Stochastic Arithmetic
IIR Flters Usng Stochastc Arthmetc Naman Saraf, Ka Bazargan, avd J Llja, and Marc Redel epartment of Electrcal and Computer Engneerng Unversty of Mnnesota, Twn Ctes Mnneapols, MN, USA {saraf012, ka, llja,
More informationA New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs
Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,
More informationGeneralized Multiple ROI Prioritization in JPEG2000 for Natural Images
Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar
More informationMTBF PREDICTION REPORT
MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0
More informationHardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems
Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa
More informationANNUAL OF NAVIGATION 11/2006
ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton
More informationHierarchical Generalized Cantor Set Modulation
8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton
More informationResearch on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating
, pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle
More informationMeasurements of protection ratios and overload thresholds for broadcast TV receivers
Report ITU-R BT.2215 (5/211) Measurements of protecton ratos and overload thresholds for broadcast TV recevers BT Seres Broadcastng servce (televson) Rep. ITU-R BT.2215 Foreord The role of the Radocommuncaton
More informationRobust Image Transmission Performed by SPIHT and Turbo-Codes
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:
More informationOVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS
OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons
More informationHIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY
Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,
More informationA Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis
A Novel UWB Imagng System Setup for Computer- Aded Breast Cancer Dagnoss Xang He, Ja L, Chenxng Wu Electrcal and Computer Engneerng Oakland Unversty, OU Rochester, I 48309, U.S.A xhe2@oakland.edu, l4@oakland.edu,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN
Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR
More informationMultiscale PCA based Quality Controlled Denoising of Multichannel ECG Signals
Multscale PCA based Qualty Controlled enosng of Multchannel ECG Sgnals L. N. Sharma, S. anadapat, and A. Mahanta Abstract Multscale Prncpal Component Analyss (MSPCA) s appled for qualty controlled denosng
More informationRetinal Blood Vessel Classification Based on Color and Directional Features in Fundus Images
nd Iranan Conference on Bomedcal Engneerng(ICBME 05), Iranan Research Organzaton for Scence and Technology (IROST), Tehran, Iran, 5-7 November 05 Retnal Blood Vessel Classfcaton Based on Color and Drectonal
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationSpace Time Equalization-space time codes System Model for STCM
Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationSECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images
Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMM.8.85447, IEEE Transactons
More informationTHEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textile Department, IIT Delhi, New Delhi. Compression of fibrous assemblies
THEORY OF YARN STRUCTURE by Prof. Bohuslav Neckář, Textle Department, IIT Delh, New Delh. Compresson of fbrous assembles Q1) What was the dea of fbre-to-fbre contact accordng to van Wyk? A1) Accordng to
More informationLearning Ensembles of Convolutional Neural Networks
Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)
More informationTHE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *
SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box
More information