Showing 1,421 - 1,440 results of 2,943 for search '"ENCODE"', query time: 0.04s Refine Results
  1. 1421

    Determination of Awareness Towards Olympic Concepts of National Athletes Who Students in Dücze University Sport Sciences Faculty by Mensur Pehlivan, Ömer Sivrikaya

    Published 2022-09-01
    “…The coding process was carried out by examining the data summarized and interpreted in the descriptive analysis in more detail. After the data was encoded, similar data were brought together and themed. …”
    Get full text
    Article
  2. 1422

    Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm by Ching-Yu Yang

    Published 2012-01-01
    “…More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. …”
    Get full text
    Article
  3. 1423

    A robust audio steganography algorithm based on differential evolution by Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, Feng YUE, Donghui HU

    Published 2021-11-01
    “…., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
    Get full text
    Article
  4. 1424

    Article défini, pronoms personnels de 3e personne et démonstratifs : approche comparée de l’accès à la référence by Laure Gardelle

    Published 2010-12-01
    “…About demonstratives, which can be either pronouns or determiners, it confirms that, as stated in the utterer-centred approach to language, each has a single core value, and therefore encodes a single access mode, whether it is used as a determiner or as a pronoun in context. …”
    Get full text
    Article
  5. 1425

    Finite Element Analysis of Automobile Axle Housing based on Internet-driven Collaborative Design Theory by Zhu Jianliu

    Published 2015-01-01
    “…In order to solve the problems of traditional automobile axle housing design and analysis of wide object space distribution,difficult collaborative design and poor interaction performance,a multiple analytic encoded method based on discrete wavelet transform algorithm to the compress axle housing data is used,and then a shared network drive collaborative hybrid system architecture to share and protect the axle housing analyze compressed data is created,a finite element analysis system of network drive cooperative automobile axle housing is combined with JSP.Servlet technology with secondary development of finite element and the numerical computing systems is built.Taking the Dongfeng hercules series axle dump truck as the research object,the model strength,deformation and life characteristics are studied.The results show that the finite element method and technical route based on network collaborative design theory has certain feasibility,which can overcome wide distribution,difficult collaborative design and interaction and poor performance,and the product into production efficiency can be improved and the production cost can be reduced.…”
    Get full text
    Article
  6. 1426

    Improved RLCE public key encryption scheme based on Polar codes by Zhe LI, Yiliang HAN, Yu LI

    Published 2020-10-01
    “…For PolarRLCE has no semantic security and be vulnerable to adaptively chosen ciphertext attacks.Based onrandom linear code encryptionscheme,the structure of the RLCE scheme and Polar code polarization propertieswere used to make the Polar code as underlying encoding scheme,and through the method of RLCEspad message padding,a kind of improved public key encryption scheme which considers semantic security and can resistant toadaptively chosen ciphertext attacks was proposed.The improved scheme transformed the public key matrix into a system matrix and reduces the storage space of the public key.Some pre-computation for private key are estimated to reduce the storage space of private key.Through analysis,this scheme does not change the structure of PolarRLCE scheme,which can resist structural attacks against hamming quasi-cyclic codes.At the 128 bit security level,compared with HermitianRLCE scheme,GRSRLCE scheme and GoppaMcEliece scheme,the public key size of this scheme decreased by 4%,46.5% and 47.9% respectively.…”
    Get full text
    Article
  7. 1427

    Orkney snork nie! by Stephan Bouwer

    Published 2022-11-01
    “…Two diagrammes (the nar ratological prose model and the "6 phase" communication model) are used as illustration to elucidate on encoding/decoding, with special emphasis on the contribution of the various sender collaborators and on author Esterhuizen as primary source of signification. …”
    Get full text
    Article
  8. 1428

    Text Knowledge Acquisition Method of Collaborative Product Design Based on Genetic Algorithm by Chongyuan Li, Mengmeng Yang

    Published 2022-01-01
    “…According to the operation process of the genetic algorithm, the chromosomes of clustered text are constructed and encoded and the initial population is obtained. The fitness function of clustering is constructed by the DB index evaluation method; the selection, crossover, and mutation operators in the genetic algorithm are determined; and the objective function of collaborative product design text knowledge clustering is constructed. …”
    Get full text
    Article
  9. 1429

    A multi-chroma format cascaded coding method for full-chroma image in AVS2 by Liping ZHAO, Tao LIN, Kailun ZHOU, Keli HU, Chunmei LIN

    Published 2018-04-01
    “…In the second generation of audio video coding standard (AVS2),a multi-chroma format cascaded coding method (MCFCC) for full-chroma (4:4:4 sampling format) images coding was proposed.The MCFCC algorithm firstly converts the 4:4:4 sampling format image into 4:2:0 sampling format image,then the 4:2:0 sampling format image was processed by 4:2:0 sampling format intra prediction,transform,quantization,inverse quantization,inverse transform,entropy coding and a weighted 4:4:4 sampling format distortion calculation method in the rate-distortion optimization process,finally 4:4:4 sampling format in-loop filtering and offset algorithms were applied to the 4:4:4 sampling format image after up sampling.The experimental results show that,for full-chroma natural images,the MCFCC algorithm achieves higher coding efficiency at very low additional encoding complexity and very low additional design and implementation cost.…”
    Get full text
    Article
  10. 1430

    On the oppositions that underlie the distinctions displayed by Russian causal clauses by Pekelis Olga

    Published 2022-09-01
    “…The analysis also reveals that the degrees of syntactic integration encoded by Russian causal clauses are different from those claimed for German causal clauses by previous research. …”
    Get full text
    Article
  11. 1431

    A mitochondria-to-nucleus regulation mediated by the nuclear-translocated mitochondrial lncRNAs. by Jia Li, Ruoling Bai, Yulian Zhou, Xu Song, Ling Li

    Published 2025-01-01
    “…By acting as critical molecules, the nuclear-encoded lncRNAs (nulncRNAs) have been implicated in the nucleus-to-mitochondria anterograde regulation. …”
    Get full text
    Article
  12. 1432

    Research on multiflow in wireless networks based on network coding by Jin-yi ZHOU, Shu-tao XIA, Yong JIANG, Hai-tao ZHENG

    Published 2013-08-01
    “…In a multihop wireless network,wireless interference is crucial to the multi-commodity flow problem,which studies the maximum throughput between multiple pairs of sources and sinks.Based on the observation that network coding (NC) could help to decrease the impacts of wireless interference,a framework was proposed to solve the problem for multihop wireless networks with NC.By introducing hyperarcs to model all possible (uncoded or encoded) transmissions and using the conflict graph of hyperarcs to describe the new conflict relations modified by NC (e.g.…”
    Get full text
    Article
  13. 1433

    Region of interest–based segmented tiled adaptive streaming using head-mounted display tracking sensing data by Hyun-Wook Kim, Sung-Hyun Yang

    Published 2019-12-01
    “…The player renders the downsized video as the base layer, which has a quarter of the resolution of the original video, and high-quality video tiles consisting of tiles obtained from the tiled-encoded high-quality video (over 16K resolution) as the enhanced layer. …”
    Get full text
    Article
  14. 1434

    Exercise-Induced Rhabdomyolysis and Stress-Induced Malignant Hyperthermia Events, Association with Malignant Hyperthermia Susceptibility, and RYR1 Gene Sequence Variations by Antonella Carsana

    Published 2013-01-01
    “…Mutations in RYR1 gene have been found in about 70% of MH families. The RYR1 gene encodes the skeletal muscle calcium release channel of the sarcoplasmic reticulum, commonly known as ryanodine receptor type 1 (RYR1). …”
    Get full text
    Article
  15. 1435

    Technologies for Proteome-Wide Discovery of Extracellular Host-Pathogen Interactions by Nadia Martinez-Martin

    Published 2017-01-01
    “…Emerging work illustrates a rich landscape for extracellular host-pathogen interaction and points towards the evolution of multifunctional pathogen-encoded proteins. Further development and application of technologies for genome-wide identification of extracellular protein interactions will be important in deciphering functional host-pathogen interaction networks, laying the foundation for development of novel therapeutics.…”
    Get full text
    Article
  16. 1436

    Matrix computation over homomorphic plaintext-ciphertext and its application by Yang LIU, Linhan YANG, Jingwei CHEN, Wenyuan WU, Yong FENG

    Published 2024-02-01
    “…Those homomorphic encryption schemes supporting single instruction multiple data (SIMD) operations effectively enhance the amortized efficiency of ciphertext computations, yet the structure of ciphertexts leads to high complexity in matrix operations.In many applications, employing plaintext-ciphertext matrix operations can achieve privacy-preserving computing.Based on this, a plaintext-ciphertext matrix multiplication scheme for matrices of arbitrary dimension was proposed.The resulting ciphertext was computed through steps such as encoding the plaintext matrix, transforming the dimensions of the encrypted matrix, etc.Compared to the best-known encrypted matrix multiplication algorithm for square matrices proposed by Jiang et al., the proposed scheme supported matrix multiplication of arbitrary dimension, and consecutive matrix multiplications.Both theoretical analysis and experimental results show that the proposed scheme requires less rotations on ciphertexts and hence features higher efficiency.When applied to a privacy-preserving Bayesian classifier, the proposed scheme can complete classification tasks with higher security parameters and reduced running time.…”
    Get full text
    Article
  17. 1437

    Convolutional neural network (CNN) configuration using a learning automaton model for neonatal brain image segmentation. by Iran Sarafraz, Hamed Agahi, Azar Mahmoodzadeh

    Published 2025-01-01
    “…In this article, an adaptive method for CNN automatic configuration for neonatal brain image segmentation is presented based on the encoder-decoder structure, in which the hyperparameters of this network, i.e., size, length, and width of the filter in each layer along with the type of pooling functions with a reinforcement learning approach and an LA model are determined. …”
    Get full text
    Article
  18. 1438

    Extensible hierarchical codec semantic communication system by Yuyuan ZHANG, Haitao ZHAO, Jibo WEI, Kuo CAO, Yichi ZHANG, Peng LUO, Yueling LIU, Kai MEI

    Published 2023-08-01
    “…Aiming at the problem that most current researches on text semantic communication mainly rely on simulation system for theoretical verification, an extensible hierarchical semantic communication system was proposed by taking advantage of the separation of hierarchical encoding and decoding architecture in semantic level and grammatical level.The system was compatible with the reliable communication technology under the framework of Shannon information through the mode of semantic and syntactic separation, and realized the nested combination of semantic communication and traditional communication.Furthermore, a universal and extensible verification system was built based on the software radio platform to verify the proposed semantic communication system architecture.The verification system took semantic communication software platform as the driving core of hardware drive and algorithm call, integrated the whole process of signal generation, information transmission, data acquisition, decoding and evaluation at the receiving end, and could be further extended for semantic and syntactic level.Finally, the text semantic communication was tested based on this verification system, which verified that it had higher validity and reliability than the traditional communication mode.…”
    Get full text
    Article
  19. 1439

    Deep image semantic communication model for 6G by Feibo JIANG, Yubo PENG, Li DONG

    Published 2023-03-01
    “…Current semantic communication models still have some parts that can be improved in processing image data, including effective image semantic codec, efficient semantic model training, and accurate image semantic evaluation.Hence, a deep image semantic communication (DeepISC) model was proposed.The vision transformer-based autoencoder (ViTA) network was used to achieve high-quality image semantic encoding and decoding.Then, an autoencoder realized channel codec to ensure the transmission of semantics on the channel.Furthermore, the discriminator network (DSN) and ViTA’s dual network architecture were used to jointly train, thus improving the semantic accuracy of the reconstructed image.Finally, for different downstream vision tasks, different evaluation indicators of image semantics were presented.Simulation results show that compared with other schemes, DeepISC can more effectively restore the semantic features of the transmitted image, so that the reconstructed image can show the same or similar semantic results as the original image in various downstream tasks.…”
    Get full text
    Article
  20. 1440

    Automatic classification of mobile apps to ensure safe usage for adolescents. by Hanadi Hakami

    Published 2025-01-01
    “…The proposed methodology employs multiple Machine and Deep Learning (M/DL) models, but A-CNNs based on Bidirectional Encoder Representations from Transformers embeddings outperformed other models, achieving an average accuracy of 88.74% and improving the recall from 99.33% to 99.65%.…”
    Get full text
    Article