Skip to main content
Pseudo-entropy and SVD entropy are generalizations of the entanglement entropy that involve post-selection. In this work we analyze their properties as measures on the spaces of quantum states and argue that their excess provides useful... more
    • by 
    •   15  
      Mathematical PhysicsQuantum PhysicsTopological Quantum Field TheoryQuantum Mechanics
A big challenge that faces many applications in different fields suffers in dealing with datasets of massive size. Additionally, retrieving and casting this data is somewhat time-consuming. Applications such as government or any... more
    • by 
    •   2  
      Data MiningSingular Value Decomposition (svd)
Regular E-voting systems for elections may count the votes in less time,less cost,save the privacy of citizens,but still considered risky as votes can be tampered.E-voting systems based on a network distributed ledger show fast... more
    • by 
    •   4  
      Data MiningComputer NetworksSingular Value Decomposition (svd)Distributed Ledger Technology (DLT)
With the increasing availability of location-based services, location-based social networks and smart phones, standard rating schema of recommender systems that involve user and item dimensions is extended to three-dimensional (3-D)... more
    • by 
    •   9  
      MathematicsComputer ScienceData MiningCollaborative Filtering
Recent matrix completion based methods have not been able to properly model the Haplotype Assembly Problem (HAP) for noisy observations. To deal with such cases, we propose a new Minimum Error Correction (MEC) based matrix completion... more
    • by 
    •   10  
      Single Nucleotide Polymorphisms (SNPs)Manifold learningDeep LearningHaplotypes
A new optimization design is proposed for matrix completion by weighting the measurements and deriving the corresponding error bound. Accordingly, the Haplotype reconstruction using nuclear norm minimization with Weighted Constraint... more
    • by 
    •   8  
      Compressed SensingDna SequencingHaplotypesMatrix Completion
We apply matrix completion methods for haplotype assembly from NGS reads to develop the new HapSVT, HapNuc, and HapOPT algorithms. This is performed by applying a mathematical model to convert the reads to an incomplete matrix and... more
    • by 
    •   6  
      GeneticsMathematical ModellingHaplotypesMatrix Completion
Wav2vec2 self-supervised multilingual training learns speech units common to multiple languages, leading to better generalization capacity. However, Wav2vec2 is larger than other E2E ASR models such as the Conformer ASR. Therefore, the... more
    • by 
    •   5  
      Genetic AlgorithmsEmbedded SystemsAutomatic Speech RecognitionPruning
In this paper the behavior of a novel, SVD-based adaptive controller is compared with that of the most sophisticated and popular method introduced by Slotine & Li by the use of a three degree of freedom paradigm, the cart + double... more
    • by 
    •   6  
      EngineeringComputer ScienceComputationKey words
2MAM Group of Institutions, Siruganur, Tiruchirappalli 621 105, India Received 18 November 2011; revised 19 March 2012; accepted 21 March 2012 This study proposes a blind watermarking algorithm based on Double Haar Wavelet Transform... more
    • by 
    •   9  
      MathematicsArtificial IntelligenceDigital WatermarkingSingular value decomposition
Dimension reduction is critical for many database and data mining applications, such as efficient storage and retrieval of high-dimensional data. In the literature, a well-known dimension reduction scheme is Linear Discriminant Analysis... more
    • by 
    •   17  
      MathematicsComputer ScienceDecompositionAlgorithm
It has become an important task for many voltage stability studies to find a voltage stability index. The voltage stability indices provide reliable information about proximity of voltage instability in a power system. In this paper, the... more
    • by 
    •   5  
      EngineeringElectric Power SystemGridVoltage
    • by 
    •   12  
      Computer ScienceArtificial IntelligenceMedicineCloud Computing
    • by 
    •   12  
      Computer ScienceArtificial IntelligenceMedicineCloud Computing
    • by 
    •   8  
      Computer ScienceSecurityDigital WatermarkingSingular value decomposition
The paper examines changes in air temperature, precipitation, and river discharges on seasonal and annual scale over the Sava River watershed in Bosnia & Herzegovina during the period 1961–2016. Based upon data gathered from 11... more
    • by 
    •   5  
      Environmental ScienceClimate ChangeWatershedPrecipitation
An algorithm for filtering the images contaminated by additive white Gaussian noise is proposed. The algorithm uses the groups of Hadamard transformed patches of discrete cosine coefficients to reject noisy components according to Wiener... more
    • by 
    •   6  
      MathematicsComputer ScienceAlgorithmDiscrete Cosine Transform
Epochal documents suffer from several types of noises that accumulate and evolve over time. This significantly affects their quality and makes their storage and the interpretation of their visual content problematic. Digital preservation... more
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceImage QualityQuality assessment
A novel method and software system for rational handling of time series of multi-channel measurements is presented. This quantitative learning tool, the On-The-Fly Processing (OTFP), develops reduced-rank bilinear subspace models that... more
    • by 
    •   9  
      Computer ScienceAnalytical ChemistryData MiningData Stream Mining
Grain yield stability is an important feature of crop breeding programs due mainly to the high annual variation in mean yield, particularly in arid and semi-arid areas. Conventional statistical models of stability analysis provide little... more
    • by 
    •   7  
      AgronomyBiologyCrop breedingGene-Environment Interaction
Research in the fields of machine learning and intelligent systems addresses essential problem of developing computer algorithms that can deal with huge amounts of data and then utilize this data in an intellectual way to solve a variety... more
    • by 
    •   7  
      Computer ScienceTechnologyPrincipal Component AnalysisHigh Dimensional Data
Research in the fields of machine learning and intelligent systems addresses essential problem of developing computer algorithms that can deal with huge amounts of data and then utilize this data in an intellectual way to solve a variety... more
    • by 
    •   7  
      Computer ScienceTechnologyPrincipal Component AnalysisHigh Dimensional Data
Uploading an identity card as an image for the account verification process or transactions online can be a threat to application users. Identity card theft can be carried out by irresponsible persons if the application can be hacked.... more
    • by 
    •   7  
      Computer ScienceArtificial IntelligenceDigital WatermarkingData Science
Publication in the conference proceedings of EUSIPCO, Bucharest, Romania, 2012
    • by 
    •   4  
      Computer ScienceCultural HeritageImage Restorationimage resolution
With the increasing availability of location-based services, location-based social networks and smart phones, standard rating schema of recommender systems that involve user and item dimensions is extended to three-dimensional (3-D)... more
    • by 
    •   5  
      MathematicsComputer ScienceRecommendationTensor
With the increasing availability of location-based services, location-based social networks and smart phones, standard rating schema of recommender systems that involve user and item dimensions is extended to three-dimensional (3-D)... more
    • by 
    •   5  
      MathematicsComputer ScienceRecommendationTensor
In recent years, ecommerce applications in Cameroon have grown significantly, resulting in a wide array of products. However, improving user experience remains a major challenge for existing platforms, particularly with their... more
    • by 
    •   7  
      Machine LearningCameroonEcommerceArtificial Neural Networks
Machine Learning algorithms have a variety of important applications, and among them, Recommender systems are crucial. The internet hosts an extensive volume of information, making it challenging for users to navigate and find relevant... more
    • by 
    •   15  
      FinanceApplied MathematicsArtificial IntelligenceMachine Learning
Machine Learning algorithms have a variety of important applications, and among them, Recommender systems are crucial. The internet hosts an extensive volume of information, making it challenging for users to navigate and find relevant... more
    • by  and +3
    •   18  
      FinanceApplied MathematicsArtificial IntelligenceStatistics
Digital watermarking is a technique of embedding some information (usually hidden copyright notices) into an image. Number of applications has been found in various fields like copyright protection, content authentication, document... more
    • by 
    •   12  
      Computer ScienceArtificial IntelligenceComputer VisionDigital Watermarking
In this paper the behavior of a novel, SVD-based adaptive controller is compared with that of the most sophisticated and popular method introduced by Slotine & Li by the use of a three degree of freedom paradigm, the cart + double... more
    • by 
    •   6  
      EngineeringComputer ScienceComputationKey words
Center Symmetric Local Binary Pattern (CSLBP) is widely used in texture and object detection, but its utilization in image hashing is still limited. Image hashing is a powerful technique to identify whether image content is changed or... more
    • by 
    •   2  
      Computer ScienceComputers
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
    • by  and +2
    •   8  
      Electrical EngineeringMathematicsInverse ProblemsElectromagnetics
New software applications for linear multivariable system identification are presented. The incorporated algorithms use subspace-based techniques (MOESP, N4SID, or their combination) to find a standard discrete-time state-space... more
    • by 
    •   2  
      Numerical AlgorithmsSingular Value Decomposition (svd)
This paper presents the design and finite difference time domain (FDTD) modeling of millimeter wave aperture coupled microstrip antenna that can be realized as a on chip antenna in wireless sensor nodes. At millimeter wave frequency,... more
    • by 
    •   2  
      EngineeringMicrostrip Antenna
In order to identify the weakest bus in a power system so that the Unified Power Flow Controller could be connected, an investigation of static and dynamic voltage stability is presented. Two stability indices, static and dynamic, have... more
    • by 
    •   4  
      STATCOM (Static Synchronous Compensator)ControllerSingular Value Decomposition (svd)Unified Power Flow Controller (upfc)
Problem statement: An important early sign of breast cancer is the clusters of micro calcifications in digital mammograms. To assist radiologists in the diagnosis of mammographic clusters a novel hybrid algorithm has been developed.... more
    • by 
    •   8  
      Computer ScienceArtificial IntelligenceDigital MammographyWavelet
In this paper, a new no-reference image quality assessment (NR-IQA) metric for grey images is proposed using LIVE II image database. The features used are extracted from three well-known NR-IQA objective metrics based on natural scene... more
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceImage QualitySingular value decomposition
    • by 
    •   5  
      EngineeringComputer ScienceData CompressionCompression Ratio
A new method is presented for simulation of nonlinear transmission line circuits based on proper orthogonal decomposition reduction techniques coupled with an efficient interpolatory algorithm. Evaluation of the nonlinear function and... more
    • by 
    •   11  
      Computer ScienceComputational ModelingModel Order ReductionInterpolation
This paper presents a novel hierarchical coding scheme for light fields based on transmittance patterns of low-rank multiplicative layers and Fourier disparity layers. The proposed scheme identifies multiplicative layers of light field... more
    • by 
    •   15  
      EngineeringComputer ScienceComputational PhotographyAlgorithm
Identification and prediction of a lifetime of industrial cutting tools using minimal sensors is crucial to reduce production costs and downtime in engineering systems. In this paper, we provide a formal decision software tool to extract... more
    • by 
    •   18  
      EngineeringComputer ScienceTechnologySignal Processing
In this study, an unknown input observer (UIO) is developed in explicit form to estimate unmeasurable states and unknown inputs (UIs) for nonlinear implicit systems represented by the discrete-time Takagi-Sugeno implicit systems (DTSIS)... more
    • by 
    •   7  
      MathematicsLinear Matrix InequalitiesSingular value decompositionNonlinear system
In order to identify the weakest bus in a power system so that the Unified Power Flow Controller could be connected, an investigation of static and dynamic voltage stability is presented. Two stability indices, static and dynamic, have... more
    • by 
    •   4  
      STATCOM (Static Synchronous Compensator)ControllerSingular Value Decomposition (svd)Unified Power Flow Controller (upfc)
The study of the interaction of genotype and environment adaptability and yield stability of promising barley lines is one of the major issues in the race which is very important in The development of improved cultivars. In order to... more
    • by 
    •   6  
      BiologyCultivarAdaptabilityRandomized Block design
In this study, an unknown input observer (UIO) is developed in explicit form to estimate unmeasurable states and unknown inputs (UIs) for nonlinear implicit systems represented by the discrete-time Takagi-Sugeno implicit systems (DTSIS)... more
    • by 
    •   7  
      MathematicsLinear Matrix InequalitiesSingular value decompositionNonlinear system
In this study, an unknown input observer (UIO) is developed in explicit form to estimate unmeasurable states and unknown inputs (UIs) for nonlinear implicit systems represented by the discrete-time Takagi-Sugeno implicit systems (DTSIS)... more
    • by  and +1
    •   5  
      Linear Matrix InequalitiesSingular value decompositionSingular Value Decomposition (svd) Takagi-Sugeno Fuzzy system
Individual images in dynamic molecular imaging studies are noisy because of short duration of frames. To reduce noise in these studies we used a method that employed the Hilbert transform and Singular Value Decomposition (SVD) processing.... more
    • by 
    •   9  
      MathematicsComputer ScienceImage ProcessingMolecular Imaging
This paper we present a robust non blind watermarking scheme. The proposed scheme embeds the watermark into the color image. This watermarking scheme based on a sample spline approach by extracting distinctive invariant features from... more
    • by 
    •   6  
      MathematicsArtificial IntelligenceComputer VisionDigital Watermarking
In this paper, three different transform techniques namely hybrid Discrete Wavelet Transform (DWT), Non Subsampled Contourlet Transform and Meta Heuristic Technique for image watermarking was proposed. In this proposed work, after... more
    • by