Singular Value Decomposition (svd)
113 Followers
Recent papers in Singular Value Decomposition (svd)
In this paper, a new no-reference image quality assessment (NR-IQA) metric for grey images is proposed using LIVE II image database. The features used are extracted from three well-known NR-IQA objective metrics based on natural scene... more
With the advancement in technology, digital data such as image, video, etc. can be easily manipulated. Image hashing is a method that can be used for authentica-tion and identification of digital images. In this communication , a robust... more
The purpose of this article is to determine the usefulness of the Graphics Processing Unit (GPU) calculations used to implement the Latent Semantic Indexing (LSI) reduction of the TERM-BY-DOCUMENT matrix. Considered reduction of the... more
Principal components analysis (PCA) is one of a family of techniques for taking high-dimensional data, and using the dependencies between the variables to represent it in a more tractable, lower-dimensional form, without losing too much... more
The objective of this paper is to compare the performance of Singular Value Decomposition (SVD) method and Radial Basis Function (RBF) Neural Network for optimization of fuzzy outputs in the epilepsy risk level classifications from EEG... more
This paper presents a hybrid watermarking technique for medical images. The method uses a combination of three transforms: Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and singular value decomposition (SVD). Then,... more
With the vast growth of internet technology, digital content protection has become very important. Various algorithms have been/being developed for preserving proprietary rights. Digital watermarking technique is the good measure for... more
This paper focuses on no-reference image quality assessment(NR-IQA)metrics. In the literature, a wide range of algorithms are proposed to automatically estimate the perceived quality of visual data. However, most of them are not able to... more
Secret key extraction is a crucial issue in physical layer security and a promising technique for the next generation of 5G and beyond. Unlike previous works on this topic in which Orthogonal Frequency Division Multiplexing (OFDM)... more
This paper is a comparative study between the performances of conventional terrestrial multicell Multiple Input Multiple Output (MIMO) working in a Rayleigh fading environment and its corresponding High Altitude Platform (HAP) system... more
Video denoising is a longstanding area of research. The core problem is to remove noise without affecting image details. The paper presents a new algorithm which combines motion compensation, patch based method and multiresolution... more
We consider calibration of second-order, or hyphenated instruments generating bilinear two-way data for each specimen. The bilinear regression model is to be estimated from a number of specimens of known composition. We propose a simple... more
Signal & Image Processing : An International Journal is an Open Access peer-reviewed journal intended for researchers from academia and industry, who are active in the multidisciplinary field of signal & image processing. The scope of the... more
This paper explores and compares techniques for automatically recognizing facial actions in sequences of images.The comparative study of Facial Expression Recognition techniques namely Principal Component analysis (PCA), PCA with SVD... more
This paper presents a contourlet transform based watermarking scheme for colour images. It also makes use of discrete cosine transform and singular value decomposition. Discrete cosine transform is applied on three colour components (Y,... more
Today an increasing digital world, personal reliable authentication has become an important human Computer interface activity. It is very important to establish a person's identity. In today existing security mainly depends on... more
With the advancement in technology, digital data such as image, video, etc. can be easily manipulated. Image hashing is a method that can be used for authentica-tion and identification of digital images. In this communication , a robust... more
This paper presents a novel hierarchical coding scheme for light fields based on transmittance patterns of low-rank multiplicative layers and Fourier disparity layers. The proposed scheme identifies multiplicative layers of light field... more
Research in the fields of machine learning and intelligent systems addresses essential problem of developing computer algorithms that can deal with huge amounts of data and then utilize this data in an intellectual way to solve a variety... more
The purpose of this article is to determine the usefulness of the Graphics Processing Unit (GPU) calculations used to implement the Latent Semantic Indexing (LSI) reduction of the TERM-BY-DOCUMENT matrix. Considered reduction of the... more
The reactive power is control by using Matrix converter at variable speed permanent-magnet synchronous wind generator and improving the performance. The frequency and amplitude of induced voltage also changes due to variation of wind... more