Journal articles on the topic 'Sobel and bilinear operations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Sobel and bilinear operations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Uthaib, Masar Abed, and Muayad Sadik Croock. "Vehicle plate localization and extraction based on hough transform and bilinear operations." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 1088–97. https://doi.org/10.11591/ijeecs.v20.i2.pp1088-1097.
Full textAbed Uthaib, Masar, and Muayad Sadik Croock. "Vehicle plate localization and extraction based on hough transform and bilinear operations." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 1088. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp1088-1097.
Full textYilmaz, Rusen. "LATTICE OPERATIONS OF POSITIVE BILINEAR MAPPINGS." Taiwanese Journal of Mathematics 12, no. 1 (2008): 39–49. http://dx.doi.org/10.11650/twjm/1500602487.
Full textChen, Shuaiming, Shuhui Yin, and Yizhan Zhao. "An improved hibbard interpolation algorithm based on edge gradient feature detection using Sobel operator." Applied and Computational Engineering 4, no. 1 (2023): 786–94. http://dx.doi.org/10.54254/2755-2721/4/2023424.
Full textSlovák, Jan. "Remark on bilinear operations on tensor fields." Archivum Mathematicum, no. 5 (2020): 301–5. http://dx.doi.org/10.5817/am2020-5-301.
Full textAdriyanto, Oscar, and Halim Agung. "Edge Detection to Indication Brain Tumor Using Sobel and Morphological Operations Methods Based on Image Magnetic Resonance Imaging." Computer Engineering, Science and System Journal 3, no. 2 (2018): 179. http://dx.doi.org/10.24114/cess.v3i2.10024.
Full textHrytsyk, Volodymyr, Mykola Medykovskyy, and Mariia Nazarkevych. "Estimation of Symmetry in the Recognition System with Adaptive Application of Filters." Symmetry 14, no. 5 (2022): 903. http://dx.doi.org/10.3390/sym14050903.
Full textHuang, Ru Fen, and Qiang Nong. "Efficient Certificate-Based Blind Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 220-223 (November 2012): 2735–39. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2735.
Full textSavostyanov, D. V., E. E. Tyrtyshnikov, and N. L. Zamarashkin. "Fast truncation of mode ranks for bilinear tensor operations." Numerical Linear Algebra with Applications 19, no. 1 (2011): 103–11. http://dx.doi.org/10.1002/nla.765.
Full textPeng, Chun Jiang, Qian Cheng Zhao, and Geng Huang. "Slant Detection and Correction of Mobile Phone Keyboard Image." Applied Mechanics and Materials 103 (September 2011): 102–8. http://dx.doi.org/10.4028/www.scientific.net/amm.103.102.
Full textHu, Ruifeng. "Development of Sobel Algorithm on FPGA." Highlights in Science, Engineering and Technology 131 (March 25, 2025): 24–28. https://doi.org/10.54097/py3p9q11.
Full textIto, Masaaki. "A reduce program for Hirota's bilinear operator and Wronskian operations." Computer Physics Communications 50, no. 3 (1988): 321–30. http://dx.doi.org/10.1016/0010-4655(88)90188-9.
Full textLiu, Yilong, Shengwei Xu, and Ziyan Yue. "A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network." Entropy 25, no. 7 (2023): 979. http://dx.doi.org/10.3390/e25070979.
Full textDuan, Gangpeng. "Lightweight hybrid signature scheme for Internet of Thing based on bilinear mapping." Journal of Physics: Conference Series 2294, no. 1 (2022): 012012. http://dx.doi.org/10.1088/1742-6596/2294/1/012012.
Full textXu, Zhenwu, Jinan Shen, Fang Liang, and Yingjie Chen. "Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud." Journal of Advanced Computational Intelligence and Intelligent Informatics 25, no. 2 (2021): 170–76. http://dx.doi.org/10.20965/jaciii.2021.p0170.
Full textWürker, U. "On decomposition in bilinear programming." Optimization 20, no. 1 (1989): 45–60. http://dx.doi.org/10.1080/02331938908843413.
Full textV, Nanammal, and Neha Gangrade. "Design of Power and Area Efficient Approximate Multipliers for Edge Detection Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 298–301. http://dx.doi.org/10.22214/ijraset.2022.46620.
Full textPRAKASH, CH JAYA. "AN EFFICIENT VLSI IMPLEMENTATION OF EDGE DETECTION OF IMAGES." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33857.
Full textYang, Yifan, Xiaotong Zhou, Binting Su, and Wei Wu. "Efficient Identity-Based Universal Designated Verifier Signature Proof Systems." Mathematics 13, no. 5 (2025): 743. https://doi.org/10.3390/math13050743.
Full textEdwin, R. Arboleda, C. Fajardo Arnel, and P. Medina Ruji. "Green coffee beans feature extractor using image processing." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 4 (2020): 2027–34. https://doi.org/10.12928/TELKOMNIKA.v18i4.13968.
Full textYeo, Yeong-Koo, and Yeon-Uk Choo. "Bilinear model predictive control of grade change operations in paper production plants." Korean Journal of Chemical Engineering 23, no. 2 (2006): 167–70. http://dx.doi.org/10.1007/bf02705710.
Full textLi, Fuxiang, Fucai Zhou, Heqing Yuan, Zifeng Xu, and Qiang Wang. "Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud." Concurrency and Computation: Practice and Experience 28, no. 11 (2016): 3238–53. http://dx.doi.org/10.1002/cpe.3783.
Full textDoroshenko, Stanislav, Sergey Nefedev, and Vadim Malykh. "EFFICIENCY OF DESTRUCTION OF ROCKS AND REINFORCED CONCRETE STRUCTURE IN SOLVING PROBLEMS IN EMERGENCY SITUATIONS USING SHOCK WAVE CUTTING THECHNOLOGY." Problems of risk management in the technosphere 2024, no. 3 (2024): 86–95. https://doi.org/10.61260/1998-8990-2024-3-86-95.
Full textAbbood, Abdulnasser Abduljabbar, Faris K. Al-Shammri, Ali A. Alaidany, et al. "Benchmarking Bilinear Pair Cryptography for Resource-Constrained Platforms Using Raspberry Pi." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 22 (February 7, 2025): 245–57. https://doi.org/10.37394/23209.2025.22.21.
Full textBest, Michael J., and Xili Zhang. "Degeneracy Resolution for Bilinear Utility Functions." Journal of Optimization Theory and Applications 150, no. 3 (2011): 615–34. http://dx.doi.org/10.1007/s10957-011-9846-y.
Full textFilar, J. A., and T. A. Schultz. "Bilinear programming and structured stochastic games." Journal of Optimization Theory and Applications 53, no. 1 (1987): 85–104. http://dx.doi.org/10.1007/bf00938818.
Full textBHUIYAN, SHARIF M. A., JESMIN F. KHAN, and REZA R. ADHAMI. "A NOVEL APPROACH OF EDGE DETECTION VIA A FAST AND ADAPTIVE BIDIMENSIONAL EMPIRICAL MODE DECOMPOSITION METHOD." Advances in Adaptive Data Analysis 02, no. 02 (2010): 171–92. http://dx.doi.org/10.1142/s1793536910000446.
Full textYu, Jinxia, Guanghui He, Xixi Yan, Yongli Tang, and Rongxia Qin. "Outsourced ciphertext-policy attribute-based encryption with partial policy hidden." International Journal of Distributed Sensor Networks 16, no. 5 (2020): 155014772092636. http://dx.doi.org/10.1177/1550147720926368.
Full textKonno, Hiroshi, and Michimori Inori. "BOND PORTFOLIO OPTIMIZATION BY BILINEAR FRACTIONAL PROGRAMMING." Journal of the Operations Research Society of Japan 32, no. 2 (1989): 143–58. http://dx.doi.org/10.15807/jorsj.32.143.
Full textChandrasekaran, Balaji, and Ramadoss Balakrishnan. "An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments." Cryptography 2, no. 3 (2018): 14. http://dx.doi.org/10.3390/cryptography2030014.
Full textOlkin, Ingram, Thomas Santner, and Y. L. Tong. "THE SCIENTIFIC CONTRIBUTIONS OF MILTON SOBEL." Probability in the Engineering and Informational Sciences 20, no. 3 (2006): 383–411. http://dx.doi.org/10.1017/s0269964806060244.
Full textFoulds, L. R., D. Haugland, and K. JÖrnsten. "A bilinear approach to the pooling problem†." Optimization 24, no. 1-2 (1992): 165–80. http://dx.doi.org/10.1080/02331939208843786.
Full textPavan Kumar, U., and Bharathi S H. "Visual Background Extractor with Improved Sobel Operator for Moving Object Detection." International Journal of Engineering & Technology 7, no. 3.12 (2018): 1297. http://dx.doi.org/10.14419/ijet.v7i3.12.17874.
Full textChen, Guomin, and Guangjie Wen. "Research on automatic segmentation and recognition of single characters in original rubbings based on intelligent recognition of oracle bone inscriptions." Highlights in Science, Engineering and Technology 115 (October 28, 2024): 286–93. http://dx.doi.org/10.54097/0k5qen34.
Full textLi, Xiao Mei, Xi Lin Zhu, Yong Yu, Xiang Zou, and Chen Jun Huang. "The Image Positioning and Segmentation Techniques about Gauge Visual Detection System between High Signals and Contact Net Based on Target Feature." Key Engineering Materials 522 (August 2012): 351–54. http://dx.doi.org/10.4028/www.scientific.net/kem.522.351.
Full textShao, Zhi Yi, and Bo Yang. "Integrity Verification for Cloud Storage." Applied Mechanics and Materials 687-691 (November 2014): 3015–18. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3015.
Full textZhang, Bo, Zhongtian Jia, and Chuan Zhao. "An Efficient Certificateless Generalized Signcryption Scheme." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3578942.
Full textXu, Xiang, Yu Wang, Xue-Dian Zhang, and Min-Shan Jiang. "A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server." Security and Communication Networks 2023 (April 17, 2023): 1–9. http://dx.doi.org/10.1155/2023/1164728.
Full textLi, Yuxi, Jingjing Chen, Fucai Zhou, and Dong Ji. "EKV-VBQ: Ensuring Verifiable Boolean Queries in Encrypted Key-Value Stores." Sensors 24, no. 21 (2024): 6792. http://dx.doi.org/10.3390/s24216792.
Full textZhang, Yingying, Jiwen Zeng, Wei Li, and Huilin Zhu. "A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model." Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7696858.
Full textHalperin, Ido, Grigory Agranovich, and Yuri Ribakov. "Optimal Control of a Constrained Bilinear Dynamic System." Journal of Optimization Theory and Applications 174, no. 3 (2017): 803–17. http://dx.doi.org/10.1007/s10957-017-1095-2.
Full textZhou, Jinsen, and Yanyong Hong. "Quadratic Leibniz conformal algebras." Journal of Algebra and Its Applications 18, no. 10 (2019): 1950195. http://dx.doi.org/10.1142/s0219498819501950.
Full textNidhyananthan, S. Selva, Prasad M., and Shantha Selva Kumari R. "Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group." International Journal of Information Security and Privacy 9, no. 4 (2015): 1–19. http://dx.doi.org/10.4018/ijisp.2015100101.
Full textNi, Xiang, and Chengming Bai. "Octo-bialgebras." Algebra Colloquium 19, no. 02 (2012): 305–32. http://dx.doi.org/10.1142/s100538671200020x.
Full textArthur, Jeffrey L. "Stochastic Models in Operations Research, Volume II. Stochastic Optimization (Daniel P. Heyman and Matthew J. Sobel)." SIAM Review 27, no. 1 (1985): 87–88. http://dx.doi.org/10.1137/1027017.
Full textAl-Shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam, and Iznan H. Hasbullah. "A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks." Sensors 22, no. 5 (2022): 1696. http://dx.doi.org/10.3390/s22051696.
Full textGupta, Daya Sagar, and G. P. Biswas. "A Secure Cloud Storage using ECC-Based Homomorphic Encryption." International Journal of Information Security and Privacy 11, no. 3 (2017): 54–62. http://dx.doi.org/10.4018/ijisp.2017070105.
Full textAshraf, Haroon, Wail A. Mousa, and Saleh Al Dossary. "Sobel filter for edge detection of hexagonally sampled 3D seismic data." GEOPHYSICS 81, no. 6 (2016): N41—N51. http://dx.doi.org/10.1190/geo2015-0495.1.
Full textOrthy, Mumtahina, Sheikh Md Rabiul Islam, Faijah Rashid, and Md Asif Hasan. "Implementation of Image Enhancement and Edge Detection Algorithm on Diabetic Retinopathy (DR) Image Using FPGA." IET Circuits, Devices & Systems 2023 (December 11, 2023): 1–12. http://dx.doi.org/10.1049/2023/8820773.
Full textHansen, Pierre, and Brigitte Jaumard. "Reduction of indefinite quadratic programs to bilinear programs." Journal of Global Optimization 2, no. 1 (1992): 41–60. http://dx.doi.org/10.1007/bf00121301.
Full text