SVD
12 Followers
Recent papers in SVD
The human's Micro-Doppler signatures resulting from breathing, arm, foot and other periodic motion can provide valuable information about the structure of the moving parts and may be used for identification and classification purposes. In... more
The Nyquist constraint for regular sampling of multiband signals is that the sampling rate must fall in an "allowed band." For random sampling, the sampling rate only has to exceed the Nyquist-Landau rate (information rate), which is a... more
The purpose of this article is to determine the usefulness of the Graphics Processing Unit (GPU) calculations used to implement the Latent Semantic Indexing (LSI) reduction of the TERM-BY-DOCUMENT matrix. Considered reduction of the... more
To ensure the quality of the nanoimprint fabricated optical gratings, optical scatterometry (OS) is an efficient and effective mean to diagnose the actual fabricated geometry. To facilitate the diagnosis process, efficient pattern... more
This paper presents a new hybrid optimization strategy for training feedforward neural networks. The algorithm combines gradient-based optimization of nonlinear weights with singular value decomposition (SVD) computation of linear weights... more
This work deals with the use of multiple correspondence analysis (MCA) and a weighted Euclidean distance (the tolerance distance) as an exploratory tool in developing predictive logistic models. The method was applied to a living-donor... more
Recently laser scanning technologies become widely used in many areas of the modern economy. In the following paper authors show a potential spectrum of use Terrestrial Laser Scanning (TLS) in diagnostics of reinforced concrete elements.... more
SVD-разложение и его практические приложения с исходным кодом на языке Матлаб и подробными комментариями.
A code transaction modifies a set of code files and runs a set of tests to make sure that it does not break any of the existing features. But how do we choose the target set of tests? There could be 1000s of tests. Do we run all those... more
Nowadays, recommendation systems are used successfully to provide items (example: movies, music, books, news, images) tailored to user preferences. Amongst the approaches existing to recommend adequate content, we use the collaborative... more
This issue (DOI: 10.13140/RG.2.2.10242.07361) includes the following articles; P1151637518, Author="Géraud Azehoun-Pazou and Kokou Assogba", Title="Automatic Recognition of Lesion-like Regions in Black Skin Medical Images" P1151636515,... more
Medical image security provides challenges and opportunities, watermarking and encryption of medical images provides the necessary control over the flow of medical information. In this paper a dual security approach is employed .A medical... more
Parkinson's disease is a common and debilitating condition, caused by aberrant activity in a complex basal ganglia-thalamocortical circuit. Therapeutic advances rely on characterising interactions in this circuit. However, recording... more
The paper proposes a novel robust watermarking technique based on newly introduced Nonsubsampled contourlet transform(NSCT) and singular value decomposition(SVD) for multimedia copyright protection. The NSCT can give the asymptotic... more
Phương pháp Delphi là một kỹ thuật hỗ trợ quá trình thảo luận nhóm để đưa ra giải pháp cho một vấn đề cụ thể. Cụ thể hơn, Phương pháp Delphi là một quá trình thảo luận có bài bản để nhóm các chuyên gia tích lũy thông tin và thể hiện tri... more
Most of the wireless communication technologies are not able to provide substantial gain in terms of reliability and capacity due to the effect of multipath fading and limited spectrum. A best solution to overcome these problems is... more
In this paper, we will focus on the collaborative MIMO in combination with the LTE-advanced system. In this system, two or more users each using multiple antennas are transmitting their data within the same frequency/time grid. In this... more
In order to contribute to the security of sharing and transferring medical images, we had presented a multiple watermarking technique for multiple protections; it was based on the combination of three transformations: the discrete wavelet... more
a tensorial approach to describe a k-way army, the singular value decomposition of this type of multiarray is established. The algorithm given to attain a 0 1998 Elsevier Science Inc. All rights reserved.
Cloud computing is a well-known subject in IT system and is based on network and computer utilities. Cloud computing is the main source of storage facilities for small, medium and large companies in recent years. Since, many customers... more
A pilfered duplicate of a digital video would be easily disseminated to the global audience because of the rapid high-speed internet. Due to impeccably replicable nature of digital video, numerous unlawful duplicates of the original video... more
This paper focuses on no-reference image quality assessment(NR-IQA)metrics. In the literature, a wide range of algorithms are proposed to automatically estimate the perceived quality of visual data. However, most of them are not able to... more
In this paper we propose a semi-blind watermarking scheme using Discrete Wavelet Transform and Singular Value Decomposition for copyright protection. We used a gray scale image as a watermark to hide in another gray scale image as a cover... more
A photochemically-induced fluorescence system combined with second-order chemometric analysis for the determination of the anticonvulsant carbamazepine (CBZ) is presented. CBZ is a widely used drug for the treatment of epilepsy and is... more
Secret key extraction is a crucial issue in physical layer security and a promising technique for the next generation of 5G and beyond. Unlike previous works on this topic in which Orthogonal Frequency Division Multiplexing (OFDM)... more
The combination texture feature extraction approach for texture image retrieval is proposed in this paper. Two kinds of low level texture features were combined in the approach. One of them was extracted from singular value decomposition... more
Despite the popularity of Matrix factorization methods (MF) in Recommender Systems (RSs), it is not clear the practical distinction among them in real scenarios. In this context, this work organizes existing methods, proposing a taxonomic... more
A method for determining the bidomain conductivity values is developed. The study was generated because the different sets of measured conductivity values reported in the literature each produce significantly different bidomain simulation... more
This paper examines the implementation of the Singular Value Decomposition (SVD) method to detect the presence of wireless signal. The method is used to find the maximum and minimum eigenvalues. We simulated the algorithm using common... more
This dissertation deals with a class of nonlinear adjustment problems that has a direct least squares solutionfor certain weighting cases. In the literature of mathematical statistics these problems are expressed in anonlinear model... more
In this study we will provide a new way of images compression based on two mathematic concepts, these two concepts are Singular Value Decomposition (SVD) and Block Truncation Coding. The input image either is in JPEG format or in BMP... more
In system identification and parametric spectral estimation by two-dimensional (2-D) autoregressive (AR) and 2-D autoregressive moving average (ARMA) models, the order selection problem is often required. In this correspondence, we show... more
This paper highlights an algorithm for detecting the presence of wireless signal using the Singular Value Decomposition (SVD) technique. We simulated the algorithm to detect common digital signals in wireless communication to test the... more
The ability of biogeochemical ecosystem models to represent agro-ecosystems depends on their correct integration with field observations. We report simultaneous calibration of 67 DayCent model parameters using multiple observation types... more
An algorithm is described that identifies the shape of the impulse within the impulse noise component of the HFC upstream channel. The cross-correlation function (CCF) is used t o align samples of the impulse waveforms in time. The... more
The purpose of this article is to determine the usefulness of the Graphics Processing Unit (GPU) calculations used to implement the Latent Semantic Indexing (LSI) reduction of the TERM-BY-DOCUMENT matrix. Considered reduction of the... more
Recommender systems use statistical and knowledge discovery techniques in order to recommend products to users and to mitigate the problem of information overload. The evaluation of the quality of recommender systems has become an... more
This work deals with the use of multiple correspondence analysis (MCA) and a weighted Euclidean distance (the tolerance distance) as an exploratory tool in developing predictive logistic models. The method was applied to a living-donor... more
It is known that ramp-based models are not sufficient for accurate timing modeling. In this paper, we develop a technique that accurately models the waveforms, and also allows a flexible trade-off of accuracy vs. computational and... more