Sciweavers

856 search results - page 40 / 172
» An Adaptive Steganographic Method Using Additive Noise
Sort
View
ISQED
2003
IEEE
109views Hardware» more  ISQED 2003»
15 years 10 months ago
Modeling and Analysis of Power Distribution Networks for Gigabit Applications
—As the operating frequency of digital systems increases and voltage swing decreases, it becomes very important to characterize and analyze power distribution networks (PDNs) acc...
Wendemagegnehu T. Beyene, Chuck Yuan, Joong-Ho Kim...
JSAC
2010
92views more  JSAC 2010»
15 years 3 months ago
Analysis of Nonlinear Transition Shift and Write Precompensation in Perpendicular Recording Systems
Abstract—In high density perpendicular magnetic recording channels, nonlinear transition shift (NLTS) is one of the distortions that can degrade the system performance. Write pre...
Zheng Wu, Paul H. Siegel, Jack K. Wolf, H. Neal Be...
TMI
2008
92views more  TMI 2008»
15 years 5 months ago
Using Perturbation Theory to Compute the Morphological Similarity of Diffusion Tensors
Computing the morphological similarity of diffusion tensors (DTs) at neighboring voxels within a DT image, or at corresponding locations across different DT images, is a fundamenta...
Ravi Bansal, Lawrence H. Staib, Dongrong Xu, Andre...
ICIP
2002
IEEE
16 years 7 months ago
A publishing system based on fluency coding method
This paper proposes a new publishing system using PC and large-sized printer that can produce high quality printed matters comprising text, charts, and illustrations, etc. To cons...
Fumio Kawazoe, Kazuo Toraichi, Paul Wing Hing Kwan...
ICASSP
2011
IEEE
14 years 9 months ago
An unconstrained method for lip detection in color images
The use of visual information derived from accurate lip extraction, can provide features invariant to noise perturbation for speech recognition systems and can be also used in a w...
Evangelos Skodras, Nikolaos D. Fakotakis