Search alternatives:
code generation » power generation (Expand Search)
code encryption » secure encryption (Expand Search)
code generation » power generation (Expand Search)
code encryption » secure encryption (Expand Search)
-
1
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
Published 2024“…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
-
2
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
3
-
4
-
5
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. …”
-
6
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022“…During coding, 64 proposed features were generated from the coder for each frame. …”
Get full text
article -
7
Generating haptic texture using solid noise
Published 2021“…In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm is proposed for virtual texture simulation by using solid noise, where only a few parameters need to be altered to generate a range of realistic and diverse textures by reproducing different frequencies similar to that of real vibrational signals in a virtual environment. …”
-
8
LungVision: X-ray Imagery Classification for On-Edge Diagnosis Applications
Published 2024Get full text
article -
9
-
10
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
11
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
12
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Node failures in distributed storage systems are becoming a critical issue, and many erasure codes are designed to handle such failures. The purpose of this paper is to evaluate fractional repetition (FR) codes, a class of regenerating codes for distributed storage systems, as a practical solution. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
13
-
14
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…Integrating cryptographic algorithms with biometric minutiae features effectively addresses the limitations of cancellable biometric templates, which can be susceptible to inversion attacks and template reconstruction. …”
-
15
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…This is achieved by mapping shell deformations and stresses to a set of images that are used to train a conditional generative adversarial network. …”
-
16
A new genetic algorithm approach for unit commitment
Published 1997“…In the proposed algorithm, coding the solution of the unit commitment problem is based on mixing binary and decimal representations. …”
Get full text
Get full text
article -
17
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…In the implementation for the GA, coding of the UCP solutions is based on mixing binary and decimal representations. …”
Get full text
Get full text
article -
18
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
19
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
Get full text
Get full text
Get full text
Get full text
article -
20
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …”
Get full text
Get full text
article