The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously an...
Mohamed Medhat Gaber, Arkady B. Zaslavsky, Shonali...
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
In the finite element analysis that deals with large deformation, the process usually produces distorted elements at the later stages of the analysis. These distorted elements lea...
We present a perceptually designed hardwareaccelerated algorithm for generating unique background textures for distinguishing documents. To be recognizable, the texture should pro...
A constraint satisfaction problem (CSP) is a problem to find an assignment that satisfies given constraints. An interesting approach to CSP is a repair-based method that first gen...