To see the other types of publications on this topic, follow the link: Sobel and bilinear operations.

Journal articles on the topic 'Sobel and bilinear operations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Sobel and bilinear operations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Uthaib, Masar Abed, and Muayad Sadik Croock. "Vehicle plate localization and extraction based on hough transform and bilinear operations." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 1088–97. https://doi.org/10.11591/ijeecs.v20.i2.pp1088-1097.

Full text
Abstract:
In general, the extraction of the vehicle plate is a previous step of plate recognition, and it actively studied for several decades. Plate localization is used in various security and traffic applications. In this paper, the proposed method is efficient to localize a plate for the multinational countries. The proposed method consists of three levels. The first level is the preprocessing that contains several steps. The digital camera capture images have been taken about twenty meters from the car with zooming two to three meters. Images are resampled using the zooming technique (bilinear interpolation) that makes the dimension of image (1024 x 768) pixels. The resampled images are resized to (940x 730). These images are converted to grayscale (green channel), and the bilateral filter is applied for removing noise. The second level is plate detection that adopts morphological operations, image subtraction, and vertical edge detection (Sobel). At the last Connected component analysis and Hough transform are used. The third level is the Deskew plate that notifies the plate may skew so that Hough transform is used to detect the largest line segment. Then, the images are rotated using bilinear interpolation. About 860 images are tested for different countries (Iraq, Belarus, Armenia, Hungary), and the accuracy is 98.99 % for extraction of the plate and 100% for the Deskew plate. Thus, the proposed system shows high efficiency in achievement.
APA, Harvard, Vancouver, ISO, and other styles
2

Abed Uthaib, Masar, and Muayad Sadik Croock. "Vehicle plate localization and extraction based on hough transform and bilinear operations." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 1088. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp1088-1097.

Full text
Abstract:
<p>In general, the extraction of the vehicle plate is a previous step of plate recognition, and it actively studied for several decades. Plate localization is used in various security and traffic applications. In this paper, the proposed method is efficient to localize a plate for the multinational countries. The proposed method consists of three levels. The first level is the preprocessing<strong> </strong>that contains several steps. The digital camera capture images have been taken about twenty meters from the car with zooming two to three meters. Images are resampled using the zooming technique (bilinear interpolation) that makes the dimension of image (1024 x 768) pixels. The resampled images are resized to (940x 730). These images are converted to grayscale (green channel), and the bilateral filter is applied for removing noise. The second level is plate detection that adopts morphological operations, image subtraction, and vertical edge detection (Sobel). At the last Connected component analysis and Hough transform are used. The third level is the Deskew plate that notifies the plate may skew so that Hough transform is used to detect the largest line segment. Then, the images are rotated using bilinear interpolation. About 860 images are tested for different countries (Iraq, Belarus, Armenia, Hungary), and the accuracy is 98.99 % for extraction of the plate and 100% for the Deskew plate. Thus, the proposed system shows high efficiency in achievement.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Yilmaz, Rusen. "LATTICE OPERATIONS OF POSITIVE BILINEAR MAPPINGS." Taiwanese Journal of Mathematics 12, no. 1 (2008): 39–49. http://dx.doi.org/10.11650/twjm/1500602487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Shuaiming, Shuhui Yin, and Yizhan Zhao. "An improved hibbard interpolation algorithm based on edge gradient feature detection using Sobel operator." Applied and Computational Engineering 4, no. 1 (2023): 786–94. http://dx.doi.org/10.54254/2755-2721/4/2023424.

Full text
Abstract:
Color interpolation algorithms have important applications in color image processing, and many interpolation algorithms have been proposed one after another. The bilinear interpolation algorithm, Cok interpolation algorithm and gradient edge interpolation are three classical interpolation algorithms, however, they may cause problems such as zipper effect and Mohr's stripe effect. In this paper, this paper optimize the gradient edge algorithm, calculate the gradient by using Sobel operator and fit the direction of the edge in a weighted way, and propose a gradient edge weighted interpolation algorithm based on Sobel operator to improve the performance of the interpolation algorithm. Through the validation of color image recovery, the results show that the subjective visual effect and objective evaluation indexes such as structural similarity index, peak signal-to-noise ratio and minimum mean square error of the improved algorithm proposed in this paper are better than the traditional algorithm, which is of great significance to the improvement of the interpolation algorithm.
APA, Harvard, Vancouver, ISO, and other styles
5

Slovák, Jan. "Remark on bilinear operations on tensor fields." Archivum Mathematicum, no. 5 (2020): 301–5. http://dx.doi.org/10.5817/am2020-5-301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adriyanto, Oscar, and Halim Agung. "Edge Detection to Indication Brain Tumor Using Sobel and Morphological Operations Methods Based on Image Magnetic Resonance Imaging." Computer Engineering, Science and System Journal 3, no. 2 (2018): 179. http://dx.doi.org/10.24114/cess.v3i2.10024.

Full text
Abstract:
Brain tumors are the second leading cause of death in the world in children under 20, scientists and researchers are developing applications to react brain tumors based on magnetic resonance imaging images. In this application the method used is sobel and morphological operations. Based on research conducted on brain tumor edge detection based on magnetic resonance imaging image, sobel method can reduce the noise contained in the image mri and can localize the edge of the image of Magnetic Resonance Imaging well. This research can conclude that the sobel method is suitable for edge detection but there is still some unprocessed noise, with the results of the brain imaging of 30 test images have 60% percentage, while for the use of edge detection method of 62.11%.
APA, Harvard, Vancouver, ISO, and other styles
7

Hrytsyk, Volodymyr, Mykola Medykovskyy, and Mariia Nazarkevych. "Estimation of Symmetry in the Recognition System with Adaptive Application of Filters." Symmetry 14, no. 5 (2022): 903. http://dx.doi.org/10.3390/sym14050903.

Full text
Abstract:
The aim of this work is to study the influence of lighting on different types of filters in order to create adaptive systems of perception in the visible spectrum. This problem is solved by estimating symmetry operations (operations responsible for image/image transformations). Namely, the authors are interested in an objective assessment of the possibility of reproducing the image of the object (objective symmetry of filters) after the application of filters. This paper investigates and shows the results of the most common edge detection filters depending on the light level; that is, the behavior of the system in a room with indirect natural and standard (according to the requirements of the educational process in Ukraine) electric lighting was studied. The methods of Sobel, Sobel x, Sobel y, Prewitt, Prewitt x, Prewitt y, and Canny were used and compared in experiments. The conclusions provide a subjective assessment of the performance of each of the filters in certain conditions. Dependencies are defined that allow giving priority to certain filters (from those studied) depending on the lighting.
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Ru Fen, and Qiang Nong. "Efficient Certificate-Based Blind Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 220-223 (November 2012): 2735–39. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2735.

Full text
Abstract:
Blind signature is a well-known cryptographical technique used to construct some advanced applications for the consideration of user privacy. In this work, we propose the first efficient certificate-based blind signature scheme that follows the idea of Certificate Based Encryption (CBE) presented by Gentry in EuroCrypt 2003. The security of our scheme is based on the elliptic curve discrete logarithm problem over a finite field. In addition, our scheme does not require any pairing operations which is regarded as cosely operations compared to other operations. Compared with the other secure blind signature scheme, our scheme enjoys shorter signature length, less running time and operation cost. So it can be used widely, especially in low-bandwidth communication environments such as wireless cooperative networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Savostyanov, D. V., E. E. Tyrtyshnikov, and N. L. Zamarashkin. "Fast truncation of mode ranks for bilinear tensor operations." Numerical Linear Algebra with Applications 19, no. 1 (2011): 103–11. http://dx.doi.org/10.1002/nla.765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Peng, Chun Jiang, Qian Cheng Zhao, and Geng Huang. "Slant Detection and Correction of Mobile Phone Keyboard Image." Applied Mechanics and Materials 103 (September 2011): 102–8. http://dx.doi.org/10.4028/www.scientific.net/amm.103.102.

Full text
Abstract:
In vision detection system of mobile phone keyboard, images coming from product line are often slant. Those images have to be corrected in order to facilitate match and recognition in further image processing. This paper proposes an effective slant correction method based on the characteristics of mobile phone keyboard image. In this method, straight line edge detection is done only by horizontal Sobel operator. The angle parameter of straight line is tested by multiresolution Hough transform. Then the angle relation is deduced between the tested line and slant mobile phone keyboard image. The slant image is corrected by rotation algorithm which combines the fast rotation algorithm with bilinear interpolation algorithm. The results of experiment indicates that the method and its algorithm are effective and accurate.
APA, Harvard, Vancouver, ISO, and other styles
11

Hu, Ruifeng. "Development of Sobel Algorithm on FPGA." Highlights in Science, Engineering and Technology 131 (March 25, 2025): 24–28. https://doi.org/10.54097/py3p9q11.

Full text
Abstract:
This paper introduces the implementation history of the Sobel algorithm on FPGA. Image edge detection is a basic technique in image processing and has extensive applications in various fields such as industry, medicine, aerospace, and the military. The speed of image processing has always been a challenging problem. The Sobel algorithm combines edge detection and smoothing operators, endowing it with good detection capabilities in many environments. Its capabilities are highly suitable for use in image detection. The Sobel algorithm is based on the spatial gradient of an image. By performing convolution operations on each pixel point, it calculates the gradient magnitude and direction of that point, thereby detecting the edge information in the image. As early as 2010, Zhang Lei and others developed specific algorithm principles and FPGA design architectures to achieve image edge detection. By 2016, Du Zhengcong and Ning Longfei introduced the idea of hardware acceleration and adopted the RAM + FPGA hardware structure to improve the processing speed. They also carried out modular design and modelling with the climbing method. The text also elaborates on the technological development process of the Sobel algorithm on FPGA and so on.
APA, Harvard, Vancouver, ISO, and other styles
12

Ito, Masaaki. "A reduce program for Hirota's bilinear operator and Wronskian operations." Computer Physics Communications 50, no. 3 (1988): 321–30. http://dx.doi.org/10.1016/0010-4655(88)90188-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Yilong, Shengwei Xu, and Ziyan Yue. "A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network." Entropy 25, no. 7 (2023): 979. http://dx.doi.org/10.3390/e25070979.

Full text
Abstract:
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology provides a new solution to address the security and fine-grained access control of traffic information in vehicular ad hoc networks (VANETs). However, in most CP-ABE schemes for VANETs, attribute revocation suffers from high system consumption and complex revocation operations, as well as from high computational overhead and low efficiency due to the use of bilinear pairwise operations. Based on this, this paper proposes a lightweight CP-ABE scheme that supports direct attribute revocation in VANETs. The scheme implements an agent-based direct attribute revocation mechanism by separating dynamic and static attributes of vehicle terminals, which reduces system consumption and simplifies the revocation operation process. The scheme uses scalar multiplication on elliptic curves instead of bilinear pairing operations and uses computational outsourcing techniques to reduce the terminal decryption cost and improve the efficiency of the scheme. The security and performance analysis shows that the overall efficiency of our scheme is better than the existing schemes under the premise of ensuring data confidentiality and integrity.
APA, Harvard, Vancouver, ISO, and other styles
14

Duan, Gangpeng. "Lightweight hybrid signature scheme for Internet of Thing based on bilinear mapping." Journal of Physics: Conference Series 2294, no. 1 (2022): 012012. http://dx.doi.org/10.1088/1742-6596/2294/1/012012.

Full text
Abstract:
Abstract Most of the existing IoT communication encryption schemes have the following two problems: the sensor side needs to perform complex bilinear mapping calculations; most schemes separate key agreement and data encryption, which increases the user’s computational burden and management difficulty. This paper proposes a lightweight IoT hybrid signature scheme based on bilinear mapping. In terms of transmission efficiency, the calculation process of the bilinear map is transferred to the initialization phase of the system. The sensor side only needs low-cost operations such as hash mapping and exponential operation, which reduces the overall computing cost of the solution. In terms of security, the mathematical difficulty caused by the bilinear mapping calculation in the initialization phase is used to ensure the security of data transmission. In solving the problem of key management, the scheme uses the semi-trusted key generation center (KGC) and sensor ID to generate user session keys and data keys, which solves the public key authentication and key escrow problems of massive sensors in the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
15

Xu, Zhenwu, Jinan Shen, Fang Liang, and Yingjie Chen. "Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud." Journal of Advanced Computational Intelligence and Intelligent Informatics 25, no. 2 (2021): 170–76. http://dx.doi.org/10.20965/jaciii.2021.p0170.

Full text
Abstract:
Cloud storage technology has attracted a considerable number of users owing to its exponential growth. Storing data in the cloud can save the resources of local storage configuration and reduce the cost of local hardware investment. However, the data stored in the cloud is out of the physical control (out of control) of the user. Based on the service characteristics of the cloud environment and the security requirements of user privacy data in the cloud environment, this paper proposes an improved identity proxy re-encryption algorithm based on the advanced encryption standard algorithm. The performance of the algorithm is optimized by reducing the number of bilinear mapping operations, whose calculation takes the longest time in the proxy re-encryption scheme. Only two bilinear mapping operations are required in this scheme. In addition, the encrypted data are tested to different degrees. The experimental results show that this scheme satisfies encryption and decryption performance requirements of the user.
APA, Harvard, Vancouver, ISO, and other styles
16

Würker, U. "On decomposition in bilinear programming." Optimization 20, no. 1 (1989): 45–60. http://dx.doi.org/10.1080/02331938908843413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

V, Nanammal, and Neha Gangrade. "Design of Power and Area Efficient Approximate Multipliers for Edge Detection Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 298–301. http://dx.doi.org/10.22214/ijraset.2022.46620.

Full text
Abstract:
Abstract: In this paper, we present a novel approximate computing scheme suitable for realizing the energy-efficient multiplyaccumulate (MAC) processing. First we design the approximate 4-2 compressors generating errors in the opposite direction while minimizing the computational costs. Based on the probabilistic analysis, positive and negative multipliers are then carefully developed to provide a similar error distance. Simulation results on various practical applications reveal that the proposed MAC processing offers the energy-efficient computing scenario by extending the range of approximate parts. This Design is implemented by Verilog HDL and simulated by Modelsim 6.4 c. The Performance is measured by Xilinx tool Synthesis Process. The proposed Sobel edge detection algorithm uses approximation methods to replace the complex operations; This design is done by Matlab and Modelsim using hdldameon, This proposed multipliers arerpelaced in the sobel operator based image Edge detection.
APA, Harvard, Vancouver, ISO, and other styles
18

PRAKASH, CH JAYA. "AN EFFICIENT VLSI IMPLEMENTATION OF EDGE DETECTION OF IMAGES." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33857.

Full text
Abstract:
Edge detection is a fundamental process in image processing with significant implications across multiple domains. Within the realm of object detection, the accurate delineation of image perimeters forms the bedrock for subsequent analysis. In this study, we present an optimized Laplacian Edge Detection algorithm tailored for efficient implementation in hardware.Leveraging approximation methodologies and strategic pipelining, we streamline complex operations, thereby reducing latency and resource consumption. Our implementation, realized through the Verilog Hardware Description Language (VHDL), stands as a testament to the efficacy of our approach. Through rigorous optimization and meticulous comparison with conventional Sobel edge detection, we demonstrate superior performance metrics, including enhanced Area utilization, reduced Time Delay, and improved Power Efficiency. This work underscores the importance of methodological refinement and technological innovation in advancing edge detection techniques for practical applications. Keywords: Laplacian, Sobel, Kernel, Pixel range, Area, Power
APA, Harvard, Vancouver, ISO, and other styles
19

Yang, Yifan, Xiaotong Zhou, Binting Su, and Wei Wu. "Efficient Identity-Based Universal Designated Verifier Signature Proof Systems." Mathematics 13, no. 5 (2025): 743. https://doi.org/10.3390/math13050743.

Full text
Abstract:
The implementation of universal designated verifier signatures proofs (UDVSPs) enhances data privacy and security in various digital communication systems. However, practical applications of UDVSP face challenges such as high computational overhead, onerous certificate management, and complex public key initialization. These issues hinder UDVSP adoption in daily life. To address these limitations, existing solutions attempt to eliminate bilinear pairing operations, but their proposal still involves cumbersome certificate management and inherent interactive operations that can sometimes significantly degrade system efficiency. In this paper, we first utilize the identity-based (ID-based) SM2 digital signature scheme to construct an ID-based UDVSP system which sidesteps the cumbersome certificate management issue. To further remove the interactive requirement, we also employ the OR proof and Fiat–Shamir technologies to design the other ID-based UDVSP system. Our designs not only possess the same bilinear pairing-free advantage as Lin et al.’s proposal, but also achieve the certificate-free or non-interactive goals. Security proofs and performance analysis confirm the viability and efficiency of our systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Edwin, R. Arboleda, C. Fajardo Arnel, and P. Medina Ruji. "Green coffee beans feature extractor using image processing." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 4 (2020): 2027–34. https://doi.org/10.12928/TELKOMNIKA.v18i4.13968.

Full text
Abstract:
This study offers a novel solution to deal with the low signal-to-noise ratio and slow execution rate of the first derivative edge detection algorithms namely, Roberts, Prewitt and Sobel algorithms. Since the two problems are brought about by the complex mathematical operations being used by the algorithms, these were replaced by a discriminant. The developed discriminant, equivalent to the product of total difference and intensity divided by the normalization values, is based on the “pixel pair formation” that produces optimal peak signal to noise ratio. Results of the study applying the discriminant for the edge detection of green coffee beans shows improvement in terms of peak signal to noise ratio (PSNR), mean square error (MSE), and execution time. It was determined that accuracy level varied according to the total difference of pixel values, intensity, and normalization values. Using the developed edge detection technique led to improvements in the PSNR of 2.091%, 1.16 %, and 2.47% over Sobel, Prewitt, and Roberts respectively. Meanwhile, improvement in the MSE was measured to be 13.06%, 7.48 %, and 15.31% over the three algorithms. Likewise, improvement in execution time was also achieved at values of 69.02%, 67.40 %, and 65.46% over Sobel, Prewitt, and Roberts respectively.
APA, Harvard, Vancouver, ISO, and other styles
21

Yeo, Yeong-Koo, and Yeon-Uk Choo. "Bilinear model predictive control of grade change operations in paper production plants." Korean Journal of Chemical Engineering 23, no. 2 (2006): 167–70. http://dx.doi.org/10.1007/bf02705710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Fuxiang, Fucai Zhou, Heqing Yuan, Zifeng Xu, and Qiang Wang. "Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud." Concurrency and Computation: Practice and Experience 28, no. 11 (2016): 3238–53. http://dx.doi.org/10.1002/cpe.3783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Doroshenko, Stanislav, Sergey Nefedev, and Vadim Malykh. "EFFICIENCY OF DESTRUCTION OF ROCKS AND REINFORCED CONCRETE STRUCTURE IN SOLVING PROBLEMS IN EMERGENCY SITUATIONS USING SHOCK WAVE CUTTING THECHNOLOGY." Problems of risk management in the technosphere 2024, no. 3 (2024): 86–95. https://doi.org/10.61260/1998-8990-2024-3-86-95.

Full text
Abstract:
The article evaluates the effectiveness of the use of technological shock wave cutting of rocks. A significant reduction in the consumption of explosives and an increase in efficiency in shock-wave cutting are shown. Tasks have been solved in the interests of rescue operations in emergency situations. Characteristics of the degrees of destruction, methods and given. An analysis of the development of critical situations with the mortality of victims is given. Use of bilinear charges that realize Mach wave cutting (extreme modes of shock wave interference). Shock wave cutting of rock is an innovative technology for the mining industry, blasting operations during the demolition of structures and rescue operations in case of debris of rocks, buildings and structures.
APA, Harvard, Vancouver, ISO, and other styles
24

Abbood, Abdulnasser Abduljabbar, Faris K. Al-Shammri, Ali A. Alaidany, et al. "Benchmarking Bilinear Pair Cryptography for Resource-Constrained Platforms Using Raspberry Pi." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 22 (February 7, 2025): 245–57. https://doi.org/10.37394/23209.2025.22.21.

Full text
Abstract:
The plentiful and low-cost nature of resource-constrained platforms e.g., Raspberry Pi devices has made them a backbone of modern applications particularly in sectors such as IoT, healthcare, and industrial systems. Nevertheless, they still have some constraints in terms of processing power, memory, and available energy that could limit the deployment of some computationally expensive protocols such as Bilinear Pair Cryptography (BPC). Here, we provide a benchmarking of BPC on a Raspberry Pi, exploring the feasibility and performance of the operations at its core: encryption, decryption, signature generation, and key exchange. To better understand the computational requirements of BPC, we analyze various metrics including execution time, memory use, and energy consumption. The research suggests that lightweight operations such as point addition and hash-to-point mapping apply to real-time applications; while over-resource-expensive tasks such as key exchange need optimization and only infrequent utilization. Suggestions to implement encrypted information systems incorporate the usage of algorithmic enhancements, hardware accelerators, and/or hybrid cryptographic conventions for security-efficiency balance. This work highlights the promise of secure hardware-based solutions such as BPC for limited-resource environments while providing an overview of its usage across systems.
APA, Harvard, Vancouver, ISO, and other styles
25

Best, Michael J., and Xili Zhang. "Degeneracy Resolution for Bilinear Utility Functions." Journal of Optimization Theory and Applications 150, no. 3 (2011): 615–34. http://dx.doi.org/10.1007/s10957-011-9846-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Filar, J. A., and T. A. Schultz. "Bilinear programming and structured stochastic games." Journal of Optimization Theory and Applications 53, no. 1 (1987): 85–104. http://dx.doi.org/10.1007/bf00938818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

BHUIYAN, SHARIF M. A., JESMIN F. KHAN, and REZA R. ADHAMI. "A NOVEL APPROACH OF EDGE DETECTION VIA A FAST AND ADAPTIVE BIDIMENSIONAL EMPIRICAL MODE DECOMPOSITION METHOD." Advances in Adaptive Data Analysis 02, no. 02 (2010): 171–92. http://dx.doi.org/10.1142/s1793536910000446.

Full text
Abstract:
A novel approach of edge detection is proposed that utilizes a bidimensional empirical mode decomposition (BEMD) method as the primary tool. For this purpose, a recently developed fast and adaptive BEMD (FABEMD) is used to decompose the given image into several bidimensional intrinsic mode functions (BIMFs). In FABEMD, order statistics filters (OSFs) are employed to get the upper and lower envelopes in the decomposition process, instead of surface interpolation, which enables fast decomposition and well-characterized BIMFs. Binarization and morphological operations are applied to the first BIMF obtained from FABEMD to achieve the desired edges. The proposed approach is compared with several other edge detection methodologies, which include a combination of classical BEMD and morphological processing, the Canny and Sobel edge detectors, as well as combinations of BEMD/FABEMD and Canny/Sobel edge detectors. Simulation results with real images demonstrate the efficacy and potential of the proposed edge detection algorithm employing FABEMD.
APA, Harvard, Vancouver, ISO, and other styles
28

Yu, Jinxia, Guanghui He, Xixi Yan, Yongli Tang, and Rongxia Qin. "Outsourced ciphertext-policy attribute-based encryption with partial policy hidden." International Journal of Distributed Sensor Networks 16, no. 5 (2020): 155014772092636. http://dx.doi.org/10.1177/1550147720926368.

Full text
Abstract:
Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. First, in view of the open-access policies formulated by data owners in the cloud environment and the linear growth of bilinear pairing operations with the number of attributes in the decryption process, a verifiable outsourced attribute-based encryption with partial policy hidden scheme is proposed, in which the attribute name of access policy can be sent while attribute value involving sensitive information can be hidden, so nobody can infer information from the access policy. Second, the bilinear pairing operation and modular power operation are outsourced to the cloud server, then users only need to perform constant exponential operation to decrypt. In addition, the proposed scheme is based on the composite order bilinear group and satisfies full secure under the standard model. Finally, compared with other schemes in term of function and performance, it shows that this scheme is more efficient and suitable for resource-constrained mobile devices in outsourcing environment.
APA, Harvard, Vancouver, ISO, and other styles
29

Konno, Hiroshi, and Michimori Inori. "BOND PORTFOLIO OPTIMIZATION BY BILINEAR FRACTIONAL PROGRAMMING." Journal of the Operations Research Society of Japan 32, no. 2 (1989): 143–58. http://dx.doi.org/10.15807/jorsj.32.143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Chandrasekaran, Balaji, and Ramadoss Balakrishnan. "An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments." Cryptography 2, no. 3 (2018): 14. http://dx.doi.org/10.3390/cryptography2030014.

Full text
Abstract:
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient to some extent. The motivation of this paper is on achieving user privacy during the interaction with attribute authorities by improving the efficiency of ABE schemes in terms of computational complexity. As a result the aim of this paper is two-fold; firstly, to propose an efficient Tate pairing algorithm based on multi-base number representation system using point halving (TP-MBNR-PH) with bases 1/2, 3, and 5 to reduce the cost of bilinear pairing operations and, secondly, the TP-MBNR-PH algorithm is applied in decentralized KP-ABE to compare its computational costs for encryption and decryption with existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
31

Olkin, Ingram, Thomas Santner, and Y. L. Tong. "THE SCIENTIFIC CONTRIBUTIONS OF MILTON SOBEL." Probability in the Engineering and Informational Sciences 20, no. 3 (2006): 383–411. http://dx.doi.org/10.1017/s0269964806060244.

Full text
Abstract:
This article describes the scientific contributions of Milton Sobel. It motivates his research by considering his family background, his war experiences, and his mentors and fellow students at Columbia University. His research in sequential analysis, selection, ranking, group testing, and probabilistic combinatorics are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
32

Foulds, L. R., D. Haugland, and K. JÖrnsten. "A bilinear approach to the pooling problem†." Optimization 24, no. 1-2 (1992): 165–80. http://dx.doi.org/10.1080/02331939208843786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Pavan Kumar, U., and Bharathi S H. "Visual Background Extractor with Improved Sobel Operator for Moving Object Detection." International Journal of Engineering & Technology 7, no. 3.12 (2018): 1297. http://dx.doi.org/10.14419/ijet.v7i3.12.17874.

Full text
Abstract:
Movement detection plays a vital undertaking in numerous video based operations. A specific foundation subtraction strategy called Visual Background Extractor. It is utilized to accomplish closer view objects from the foundation of its high presentation range and low calculation. The execution isn't satisfied with a specific technique. So it speaks to an enhanced Visual foundation extractor calculation to improve the rightness and strength of progress location. In particular, a frontal area trademark outline made by enhancing the result of ViBe calculation. At that point the edge recognition of the one of a kind video outlines is accomplished after pre-honing utilizing enhanced Sobel operator. At last, the closer view, foundation highlight maps and shape substantial, the movement location outcome can be gotten. The examinations uncover the changes of the proposed adjustments at a fractional extra cost.
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Guomin, and Guangjie Wen. "Research on automatic segmentation and recognition of single characters in original rubbings based on intelligent recognition of oracle bone inscriptions." Highlights in Science, Engineering and Technology 115 (October 28, 2024): 286–93. http://dx.doi.org/10.54097/0k5qen34.

Full text
Abstract:
This paper proposes an effective segmentation and recognition method using YOLOv8 to solve the problem of segmentation and recognition of Oracle rubbings images. Draw sub-pixel edge contours through spot detection, corner detection, and edge detection (such as Canny and Sobel), and combine grayscale, opening operations, binarization, and Gaussian filtering to remove noise and repair contours, extract image features, and establish preprocessing Model. Use this model to preprocess the original oracle rubbing image and train it based on YOLOv8. The results show that this method can effectively segment and identify oracle bones characters.
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Xiao Mei, Xi Lin Zhu, Yong Yu, Xiang Zou, and Chen Jun Huang. "The Image Positioning and Segmentation Techniques about Gauge Visual Detection System between High Signals and Contact Net Based on Target Feature." Key Engineering Materials 522 (August 2012): 351–54. http://dx.doi.org/10.4028/www.scientific.net/kem.522.351.

Full text
Abstract:
In the design process of gauge visual detection system between high signals and contact net, it is need to do target positioning and segmentation between high signals and contact line. The paper first analyzes the structural characteristics of high signals and contact line, and then uses the Sobel operator for edge detection, and uses first close and then open of image morphological operations for edge treatment, finally uses Hough transform for line and circle detection to extract the object's edge. This positioning and segmentation of target object would be achieved.
APA, Harvard, Vancouver, ISO, and other styles
36

Shao, Zhi Yi, and Bo Yang. "Integrity Verification for Cloud Storage." Applied Mechanics and Materials 687-691 (November 2014): 3015–18. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3015.

Full text
Abstract:
In cloud computing, customers outsource their data to the cloud storage, as they no long physically possess the data, how to perform the integrity verification becomes more difficult. Our protocol follows Shacham and Waters’s ideas (2013). We solve the problem of customer’s privacy against both the cloud and the third-party verifier and formally prove that the complex bilinear operations can be removed under the customer’s help. Every step of our improvements is based on rigorous proofs.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Bo, Zhongtian Jia, and Chuan Zhao. "An Efficient Certificateless Generalized Signcryption Scheme." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3578942.

Full text
Abstract:
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm. The paper proposes an efficient certificateless generic signcryption scheme without utilizing bilinear pairing operations. It is proved to satisfy confidentiality and unforgeability against chosen ciphertext and message attacks in an adaptive manner, respectively, in the random oracle model. Due to the lower computational cost and communication overhead, the proposed scheme is suitable for low power and processor devices.
APA, Harvard, Vancouver, ISO, and other styles
38

Xu, Xiang, Yu Wang, Xue-Dian Zhang, and Min-Shan Jiang. "A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server." Security and Communication Networks 2023 (April 17, 2023): 1–9. http://dx.doi.org/10.1155/2023/1164728.

Full text
Abstract:
With the development of wireless technology, people increasingly rely on mobile devices. Since most mobile devices transmit sensitive information via insecure public channels, it is important to design multiauthentication key agreement protocols for security protection. Traditional scholars tend to use traditional public-key cryptosystems (PKCs) in their protocols to improve security. High-cost operations (e.g., elliptic curve point multiplication and bilinear pairing) were widely used in their scheme but were not suitable for mobile devices because of limited computing resources. In this study, we designed a novel high-efficiency multiauthentication and key agreement protocol and demonstrate its security in the random oracle model. Compared with other protocols, our proposed scheme only uses string concatenation operations, one-way hash functions, and XOR operations. In addition, our protocol requires much fewer computing resources to achieve the same level of security.
APA, Harvard, Vancouver, ISO, and other styles
39

Li, Yuxi, Jingjing Chen, Fucai Zhou, and Dong Ji. "EKV-VBQ: Ensuring Verifiable Boolean Queries in Encrypted Key-Value Stores." Sensors 24, no. 21 (2024): 6792. http://dx.doi.org/10.3390/s24216792.

Full text
Abstract:
To address the deficiencies in privacy-preserving expressive query and verification mechanisms in outsourced key-value stores, we propose EKV-VBQ, a scheme designed to ensure verifiable Boolean queries over encrypted key-value data. We have integrated blockchain and homomorphic Xor operations and pseudo-random functions to create a secure and verifiable datastore, while enabling efficient encrypted Boolean queries. Additionally, we have designed a lightweight verification protocol using bilinear map accumulators to guarantee the correctness of Boolean query results. Our security analysis demonstrates that EKV-VBQ is secure against adaptive chosen label attacks (IND-CLA) and guarantees Integrity and Unforgeability under the bilinear q-strong Diffie–Hellman assumption. Our performance evaluations showed reduced server-side storage overhead, efficient proof generation, and a significant reduction in user-side computational complexity by a factor of log n. Finally, GPU-accelerated optimizations significantly enhance EKV-VBQ’s performance, reducing computational overhead by up to 50%, making EKV-VBQ highly efficient and suitable for deployment in environments with limited computational resources.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Yingying, Jiwen Zeng, Wei Li, and Huilin Zhu. "A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model." Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7696858.

Full text
Abstract:
Ring signature is a kind of digital signature which can protect the identity of the signer. Certificateless public key cryptography not only overcomes key escrow problem but also does not lose some advantages of identity-based cryptography. Certificateless ring signature integrates ring signature with certificateless public key cryptography. In this paper, we propose an efficient certificateless ring signature; it has only three bilinear pairing operations in the verify algorithm. The scheme is proved to be unforgeable in the random oracle model.
APA, Harvard, Vancouver, ISO, and other styles
41

Halperin, Ido, Grigory Agranovich, and Yuri Ribakov. "Optimal Control of a Constrained Bilinear Dynamic System." Journal of Optimization Theory and Applications 174, no. 3 (2017): 803–17. http://dx.doi.org/10.1007/s10957-017-1095-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zhou, Jinsen, and Yanyong Hong. "Quadratic Leibniz conformal algebras." Journal of Algebra and Its Applications 18, no. 10 (2019): 1950195. http://dx.doi.org/10.1142/s0219498819501950.

Full text
Abstract:
In this paper, we study a class of Leibniz conformal algebras called quadratic Leibniz conformal algebras. An equivalent characterization of a Leibniz conformal algebra [Formula: see text] through three algebraic operations on [Formula: see text] is given. By this characterization, several constructions of quadratic Leibniz conformal algebras are presented. Moreover, one-dimensional central extensions of quadratic Leibniz conformal algebras are considered using some bilinear forms on [Formula: see text]. In particular, we also study one-dimensional Leibniz central extensions of quadratic Lie conformal algebras.
APA, Harvard, Vancouver, ISO, and other styles
43

Nidhyananthan, S. Selva, Prasad M., and Shantha Selva Kumari R. "Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group." International Journal of Information Security and Privacy 9, no. 4 (2015): 1–19. http://dx.doi.org/10.4018/ijisp.2015100101.

Full text
Abstract:
Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.
APA, Harvard, Vancouver, ISO, and other styles
44

Ni, Xiang, and Chengming Bai. "Octo-bialgebras." Algebra Colloquium 19, no. 02 (2012): 305–32. http://dx.doi.org/10.1142/s100538671200020x.

Full text
Abstract:
The notion of octo-algebra was introduced by Leroux as a Loday algebra with 8 operations. In this paper, we introduce a notion of octo-bialgebra as a bialgebra theory of octo-algebras, which is equivalent to a double construction of a quadri-algebra with a nondegenerate 2-cocycle or a double construction of an octo-algebra with a nondegenerate invariant bilinear form. Some properties of octo-bialgebras are given, including the study of the coboundary cases which leads to a construction from an analogue of the classical Yang-Baxter equation in an octo-algebra.
APA, Harvard, Vancouver, ISO, and other styles
45

Arthur, Jeffrey L. "Stochastic Models in Operations Research, Volume II. Stochastic Optimization (Daniel P. Heyman and Matthew J. Sobel)." SIAM Review 27, no. 1 (1985): 87–88. http://dx.doi.org/10.1137/1027017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Al-Shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam, and Iznan H. Hasbullah. "A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks." Sensors 22, no. 5 (2022): 1696. http://dx.doi.org/10.3390/s22051696.

Full text
Abstract:
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks. Achieving rapid message signing and verification for authentication is challenging due to complex operations, such as bilinear pairs. This paper proposes a secure pseudonym-based conditional privacy-persevering authentication scheme for communication security in VANETs. The Elliptic Curve Cryptography (ECC) and secure hash cryptographic function were used in the proposed scheme for signing and verifying messages. After a vehicle receives a significant amount of pseudo-IDs and the corresponding signature key from the Trusted Authority (TA), it uses them to sign a message during the broadcasting process. Thus, the proposed scheme requires each vehicle to check all the broadcasting messages received. Besides, in the proposed scheme, the TA can revoke misbehaving vehicles from continuously broadcasting signed messages, thus preventing insider attacks. The security analysis proved that the proposed scheme fulfilled the security requirements, including identity privacy-preservation, message integrity and authenticity, unlinkability, and traceability. The proposed scheme also withstood common security attacks such as man-in-the-middle, impersonation, modification, and replay attacks. Besides, our scheme was resistant against an adaptive chosen-message attack under the random oracle model. Furthermore, our scheme did not employ bilinear pairing operations; therefore, the performance analysis and comparison showed a lower resulting overhead than other identity-based schemes. The computation costs of the message signing, individual signature authentication, and batch signature authentication were reduced by 49%, 33.3%, and 90.2%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
47

Gupta, Daya Sagar, and G. P. Biswas. "A Secure Cloud Storage using ECC-Based Homomorphic Encryption." International Journal of Information Security and Privacy 11, no. 3 (2017): 54–62. http://dx.doi.org/10.4018/ijisp.2017070105.

Full text
Abstract:
This paper presents a new homomorphic public-key encryption scheme based on the elliptic curve cryptography (HPKE-ECC). This HPKE-ECC scheme allows public computation on encrypted data stored on a cloud in such a manner that the output of this computation gives a valid encryption of some operations (addition/multiplication) on original data. The cloud system (server) has only access to the encrypted files of an authenticated end-user stored in it and can only do computation on these stored files according to the request of an end-user (client). The implementation of proposed HPKE-ECC protocol uses the properties of elliptic curve operations as well as bilinear pairing property on groups and the implementation is done by Weil and Tate pairing. The security of proposed encryption technique depends on the hardness of ECDLP and BDHP.
APA, Harvard, Vancouver, ISO, and other styles
48

Ashraf, Haroon, Wail A. Mousa, and Saleh Al Dossary. "Sobel filter for edge detection of hexagonally sampled 3D seismic data." GEOPHYSICS 81, no. 6 (2016): N41—N51. http://dx.doi.org/10.1190/geo2015-0495.1.

Full text
Abstract:
In today’s industry, automatic detection of geologic features such as faults and channels is a challenging problem when the quality of data is not good. Edge detection filters are generally applied for the purpose of locating such features. Until now, edge detection has been carried out on rectangularly sampled 3D seismic data. The computational cost of edge detection can be reduced by exploring other sampling approaches instead of the regular rectangular sampling commonly used. Hexagonal sampling is an alternative to rectangular sampling that requires 13.4% less samples for the same level of accuracy. The hexagonal approach is an efficient method of sampling with greater symmetry compared with the rectangular approach. Spiral architecture can be used to handle the hexagonally sampled seismic data. Spiral architecture is an attractive scheme for handling 2D images that enables processing 2D data as 1D data in addition to the inherent hexagonal sampling advantages. Thus, the savings in number of samples, greater symmetry, and efficient data handling capability makes hexagonal sampling an ideal choice for computationally exhaustive operations. For the first time to our knowledge, we have made an attempt to detect edges in hexagonally sampled seismic data using spiral architecture. We compared edge detection on rectangular and hexagonally sampled seismic data using 2D and 3D filters in rectangular and hexagonal domains. We determined that hexagonal processing results in exceptional computational savings, when compared with its rectangular processing counterpart.
APA, Harvard, Vancouver, ISO, and other styles
49

Orthy, Mumtahina, Sheikh Md Rabiul Islam, Faijah Rashid, and Md Asif Hasan. "Implementation of Image Enhancement and Edge Detection Algorithm on Diabetic Retinopathy (DR) Image Using FPGA." IET Circuits, Devices & Systems 2023 (December 11, 2023): 1–12. http://dx.doi.org/10.1049/2023/8820773.

Full text
Abstract:
Diabetic retinopathy (DR) is an ocular ailment that may lead to loss of vision and eventual blindness among individuals diagnosed with diabetes. The blood vessels of the retina, a layer of light-sensitive tissue located at the posterior aspect of the ocular globe, are adversely impacted. The identification of DR entails the utilization of retinal fundus images. The detection of any form of abnormality in the eye through raw fundus images poses a significant challenge for medical practitioners. Hence, it is imperative to engage in the processing of fundus images. This paper delineates several image processing techniques for DR images, including but not limited to, manipulation of brightness levels, application of negative transformation, and utilization of threshold operations. It focuses on elucidating the enhancement techniques that pertain to DR images, which aim to optimize the visual quality of said images in order to facilitate more facile disease detection. The process of detecting edges within DR images is also executed by Sobel edge detection algorithm. In order to successfully execute the aforementioned algorithms, expedient and contemporaneous systems are favored to account for the intricacies of the image processing calculations. The exclusive utilization of software techniques in order to fulfill the prerequisites of advanced algorithms presents a significant challenge, owing to the multifarious processes that are involved in their computation, coupled with an exigent requirement for high processing speeds. The proposed model is utilized to articulate a proficient model for the design and execution of field programable gate array (FPGA)-based image enhancement processes along with the Sobel edge detection algorithm upon DR images. Finally, a Internet Protocol chip is developed that can combine multiple image enhancement operations into a single framework with less complexity.
APA, Harvard, Vancouver, ISO, and other styles
50

Hansen, Pierre, and Brigitte Jaumard. "Reduction of indefinite quadratic programs to bilinear programs." Journal of Global Optimization 2, no. 1 (1992): 41–60. http://dx.doi.org/10.1007/bf00121301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography