Singular Value Decomposition (svd)
113 Followers
Recent papers in Singular Value Decomposition (svd)
Pseudo-entropy and SVD entropy are generalizations of the entanglement entropy that involve post-selection. In this work we analyze their properties as measures on the spaces of quantum states and argue that their excess provides useful... more
A big challenge that faces many applications in different fields suffers in dealing with datasets of massive size. Additionally, retrieving and casting this data is somewhat time-consuming. Applications such as government or any... more
Regular E-voting systems for elections may count the votes in less time,less cost,save the privacy of citizens,but still considered risky as votes can be tampered.E-voting systems based on a network distributed ledger show fast... more
With the increasing availability of location-based services, location-based social networks and smart phones, standard rating schema of recommender systems that involve user and item dimensions is extended to three-dimensional (3-D)... more
Recent matrix completion based methods have not been able to properly model the Haplotype Assembly Problem (HAP) for noisy observations. To deal with such cases, we propose a new Minimum Error Correction (MEC) based matrix completion... more
A new optimization design is proposed for matrix completion by weighting the measurements and deriving the corresponding error bound. Accordingly, the Haplotype reconstruction using nuclear norm minimization with Weighted Constraint... more
We apply matrix completion methods for haplotype assembly from NGS reads to develop the new HapSVT, HapNuc, and HapOPT algorithms. This is performed by applying a mathematical model to convert the reads to an incomplete matrix and... more
Wav2vec2 self-supervised multilingual training learns speech units common to multiple languages, leading to better generalization capacity. However, Wav2vec2 is larger than other E2E ASR models such as the Conformer ASR. Therefore, the... more
In this paper the behavior of a novel, SVD-based adaptive controller is compared with that of the most sophisticated and popular method introduced by Slotine & Li by the use of a three degree of freedom paradigm, the cart + double... more
2MAM Group of Institutions, Siruganur, Tiruchirappalli 621 105, India Received 18 November 2011; revised 19 March 2012; accepted 21 March 2012 This study proposes a blind watermarking algorithm based on Double Haar Wavelet Transform... more
Dimension reduction is critical for many database and data mining applications, such as efficient storage and retrieval of high-dimensional data. In the literature, a well-known dimension reduction scheme is Linear Discriminant Analysis... more
It has become an important task for many voltage stability studies to find a voltage stability index. The voltage stability indices provide reliable information about proximity of voltage instability in a power system. In this paper, the... more
The paper examines changes in air temperature, precipitation, and river discharges on seasonal and annual scale over the Sava River watershed in Bosnia & Herzegovina during the period 1961–2016. Based upon data gathered from 11... more
An algorithm for filtering the images contaminated by additive white Gaussian noise is proposed. The algorithm uses the groups of Hadamard transformed patches of discrete cosine coefficients to reject noisy components according to Wiener... more
Epochal documents suffer from several types of noises that accumulate and evolve over time. This significantly affects their quality and makes their storage and the interpretation of their visual content problematic. Digital preservation... more
A novel method and software system for rational handling of time series of multi-channel measurements is presented. This quantitative learning tool, the On-The-Fly Processing (OTFP), develops reduced-rank bilinear subspace models that... more
Grain yield stability is an important feature of crop breeding programs due mainly to the high annual variation in mean yield, particularly in arid and semi-arid areas. Conventional statistical models of stability analysis provide little... more
Research in the fields of machine learning and intelligent systems addresses essential problem of developing computer algorithms that can deal with huge amounts of data and then utilize this data in an intellectual way to solve a variety... more
Research in the fields of machine learning and intelligent systems addresses essential problem of developing computer algorithms that can deal with huge amounts of data and then utilize this data in an intellectual way to solve a variety... more
Uploading an identity card as an image for the account verification process or transactions online can be a threat to application users. Identity card theft can be carried out by irresponsible persons if the application can be hacked.... more
Publication in the conference proceedings of EUSIPCO, Bucharest, Romania, 2012
With the increasing availability of location-based services, location-based social networks and smart phones, standard rating schema of recommender systems that involve user and item dimensions is extended to three-dimensional (3-D)... more
With the increasing availability of location-based services, location-based social networks and smart phones, standard rating schema of recommender systems that involve user and item dimensions is extended to three-dimensional (3-D)... more
In recent years, ecommerce applications in Cameroon have grown significantly, resulting in a wide array of products. However, improving user experience remains a major challenge for existing platforms, particularly with their... more
Machine Learning algorithms have a variety of important applications, and among them, Recommender systems are crucial. The internet hosts an extensive volume of information, making it challenging for users to navigate and find relevant... more
Digital watermarking is a technique of embedding some information (usually hidden copyright notices) into an image. Number of applications has been found in various fields like copyright protection, content authentication, document... more
In this paper the behavior of a novel, SVD-based adaptive controller is compared with that of the most sophisticated and popular method introduced by Slotine & Li by the use of a three degree of freedom paradigm, the cart + double... more
Center Symmetric Local Binary Pattern (CSLBP) is widely used in texture and object detection, but its utilization in image hashing is still limited. Image hashing is a powerful technique to identify whether image content is changed or... more
New software applications for linear multivariable system identification are presented. The incorporated algorithms use subspace-based techniques (MOESP, N4SID, or their combination) to find a standard discrete-time state-space... more
This paper presents the design and finite difference time domain (FDTD) modeling of millimeter wave aperture coupled microstrip antenna that can be realized as a on chip antenna in wireless sensor nodes. At millimeter wave frequency,... more
In order to identify the weakest bus in a power system so that the Unified Power Flow Controller could be connected, an investigation of static and dynamic voltage stability is presented. Two stability indices, static and dynamic, have... more
Problem statement: An important early sign of breast cancer is the clusters of micro calcifications in digital mammograms. To assist radiologists in the diagnosis of mammographic clusters a novel hybrid algorithm has been developed.... more
In this paper, a new no-reference image quality assessment (NR-IQA) metric for grey images is proposed using LIVE II image database. The features used are extracted from three well-known NR-IQA objective metrics based on natural scene... more
A new method is presented for simulation of nonlinear transmission line circuits based on proper orthogonal decomposition reduction techniques coupled with an efficient interpolatory algorithm. Evaluation of the nonlinear function and... more
This paper presents a novel hierarchical coding scheme for light fields based on transmittance patterns of low-rank multiplicative layers and Fourier disparity layers. The proposed scheme identifies multiplicative layers of light field... more
Identification and prediction of a lifetime of industrial cutting tools using minimal sensors is crucial to reduce production costs and downtime in engineering systems. In this paper, we provide a formal decision software tool to extract... more
In this study, an unknown input observer (UIO) is developed in explicit form to estimate unmeasurable states and unknown inputs (UIs) for nonlinear implicit systems represented by the discrete-time Takagi-Sugeno implicit systems (DTSIS)... more
In order to identify the weakest bus in a power system so that the Unified Power Flow Controller could be connected, an investigation of static and dynamic voltage stability is presented. Two stability indices, static and dynamic, have... more
The study of the interaction of genotype and environment adaptability and yield stability of promising barley lines is one of the major issues in the race which is very important in The development of improved cultivars. In order to... more
In this study, an unknown input observer (UIO) is developed in explicit form to estimate unmeasurable states and unknown inputs (UIs) for nonlinear implicit systems represented by the discrete-time Takagi-Sugeno implicit systems (DTSIS)... more
Individual images in dynamic molecular imaging studies are noisy because of short duration of frames. To reduce noise in these studies we used a method that employed the Hilbert transform and Singular Value Decomposition (SVD) processing.... more
This paper we present a robust non blind watermarking scheme. The proposed scheme embeds the watermark into the color image. This watermarking scheme based on a sample spline approach by extracting distinctive invariant features from... more
In this paper, three different transform techniques namely hybrid Discrete Wavelet Transform (DWT), Non Subsampled Contourlet Transform and Meta Heuristic Technique for image watermarking was proposed. In this proposed work, after... more
- by saju pillai