Segui questo link per vedere altri tipi di pubblicazioni sul tema: Image transmission.

Articoli di riviste sul tema "Image transmission"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Image transmission".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Sun, Ke Mei. "Wireless Image Transmission System." Applied Mechanics and Materials 336-338 (July 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1661.

Testo completo
Abstract (sommario):
A wireless image transmission system is proposed, which in order to offset the disadvantages of wire video monitor laying points hard, and disadvantages of wire video monitor implementing hard in bad circumstance. The core of the system is TI series of C5000 high speed DSP processor and radio frequency wireless communication chip. Through DSP transplantation of JPEG compression algorithm, complete image collection and image compression through DSP, use wireless receiving and sending module to complete wireless images data transmission. Use wireless receiving and sending module instead of emitt
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Li, Hongcheng, Geming Xia, Chaodong Yu, Yuze Zhang, and Hongfeng Li. "Adaptive Wireless Image Transmission Transformer Architecture for Image Transmission and Reconstruction." Sensors 24, no. 21 (2024): 6772. http://dx.doi.org/10.3390/s24216772.

Testo completo
Abstract (sommario):
The advancement of 6G (6th Generation Mobile Networks) communication technology has posed challenges for traditional communication network architectures in meeting the demands for communication efficiency and quality. Semantic communication technology, characterized by its “understand before transmit” approach, has emerged as a pivotal technology driving the progress of 6G due to its ability to enhance communication efficiency and quality. The Wireless Image Transmission Transformer (WITT) model, which operates as a semantic communication system leveraging vision transformer technology for the
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Chen, Yuanming, Xiaobin Hong, Bin Cui, and Rongfa Peng. "Implementation of an Efficient Image Transmission Algorithm for Unmanned Surface Vehicles Based on Semantic Communication." Journal of Marine Science and Engineering 11, no. 12 (2023): 2280. http://dx.doi.org/10.3390/jmse11122280.

Testo completo
Abstract (sommario):
With the increasingly maturing technology of unmanned surface vehicles (USVs), their applications are becoming more and more widespread. In order to meet operational requirements in complex scenarios, the real-time interaction and linkage of a large amount of information is required between USVs, between USVs and mother ships, and between USVs and shore-based monitoring systems. Visual images are the main perceptual information gathered from USVs, and their efficient transmission and recognition directly affect the real-time performance of information exchange. However, poor maritime communica
Gli stili APA, Harvard, Vancouver, ISO e altri
4

García, J. A., Rosa Rodriguez-Sánchez, and J. Fdez-Valdivia. "Sustainable image transmission." Journal of Visual Communication and Image Representation 23, no. 1 (2012): 134–42. http://dx.doi.org/10.1016/j.jvcir.2011.09.004.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Wei Gong, K. R. Rao, and M. T. Manry. "Progressive image transmission." IEEE Transactions on Circuits and Systems for Video Technology 3, no. 5 (1993): 380–83. http://dx.doi.org/10.1109/76.246089.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Yang, Ying, Xingchuang Xiong, Zilong Liu, Shangzhong Jin, and Juan Wang. "High-Performance Encryption Algorithms for Dynamic Images Transmission." Electronics 13, no. 1 (2023): 131. http://dx.doi.org/10.3390/electronics13010131.

Testo completo
Abstract (sommario):
With the proliferation of the internet, the issue of image tampering has escalated, necessitating robust image encryption schemes. Despite the multitude of proposed image encryption algorithms, challenges such as slow computational speed, weak security, and suboptimal visibility persist. This study addresses these challenges by introducing a high-performance encryption algorithm tailored for dynamic images—QEDI (Quick Encryption Algorithm for Dynamic Images). QEDI leverages elliptic curve-based asymmetric encryption algorithms and hash algorithms. The process involves using a hash algorithm to
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Nivedita, S. Angelin, and Dr T. Priyaradhikadevi. "Image Realization Steganography by Secure Key Transmission." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (2018): 1460–64. http://dx.doi.org/10.31142/ijtsrd9654.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

CHANG, CHING-YUN, and IUON-CHANG LIN. "AN EFFICIENT PROGRESSIVE IMAGE TRANSMISSION SCHEME FOR CHINESE CALLIGRAPHY." International Journal of Pattern Recognition and Artificial Intelligence 20, no. 07 (2006): 1077–92. http://dx.doi.org/10.1142/s0218001406005083.

Testo completo
Abstract (sommario):
We invented a progressive image transmission scheme that is used for transmitting Chinese calligraphy. The scheme employs the property of simple colors of calligraphy images to design a method of transmitting images phase by phase. Overall, our scheme can achieve the following two goals. One is compressing the image data to reduce the transmission time while the other is gaining less response time by using progressive image transmission. Furthermore, the recovered image still maintains the colors of the seals with high image quality.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Shi, Qi, Daheng Wang, Wen Chen, et al. "Research on Spaceborne Target Detection Based on Yolov5 and Image Compression." Future Internet 15, no. 3 (2023): 114. http://dx.doi.org/10.3390/fi15030114.

Testo completo
Abstract (sommario):
Satellite image compression technology plays an important role in the development of space science. As optical sensors on satellites become more sophisticated, high-resolution and high-fidelity satellite images will occupy more storage. This raises the required transmission bandwidth and transmission rate in the satellite–ground data transmission system. In order to reduce the pressure from image transmission on the data transmission system, a spaceborne target detection system based on Yolov5 and a satellite image compression transmission system is proposed in this paper. It can reduce the pr
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Castro, Francesco, Donato Impedovo, and Giuseppe Pirlo. "A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission." Applied Sciences 13, no. 10 (2023): 6099. http://dx.doi.org/10.3390/app13106099.

Testo completo
Abstract (sommario):
Secure transmission of medical images and medical data is essential in healthcare systems, both in telemedicine and AI approaches. The compromise of images and medical data could affect patient privacy and the accuracy of diagnosis. Digital watermarking embeds medical images into a non-significant image before transmission to ensure visual security. However, it is vulnerable to white-box attacks because the embedded medical image can be extracted by an attacker that knows the system’s operation and does not ensure the authenticity of image transmission. A visually secure image encryption schem
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Adeyinka, Michael. "Telepathological (Image Transmission) Configuration." Journal of Telemedicine and Telecare 2, no. 1_suppl (1996): 21–24. http://dx.doi.org/10.1177/1357633x9600201s07.

Testo completo
Abstract (sommario):
The Laboratory for Biomedical Informatics (LBMI) has developed a digital microscope control module incorporated into an image analysis system. This is now equipped with an ISDN switch box for linking up with a remote computer-based station for delivering histopathological services. The FRAME, client/server integrated software, was developed to initiate the communication link, adjust the microscope settings, acquire and transmit images. This LBMI telepathology initiative employs simple solutions to arrive at the point of prototyping and demonstrating the state of the art on the one hand and enc
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Shoydin, Sergey A., and Artem L. Pazoev. "«Uncanny valley» effect in holographic image transmission." Journal of the Belarusian State University. Physics, no. 3 (October 20, 2022): 4–9. http://dx.doi.org/10.33581/2520-2243-2022-3-4-9.

Testo completo
Abstract (sommario):
The quality of computer-synthesised images is continuously improving, increasing in the volume of files representing them. It is noticed that passing from simple schematic images to increasingly complex ones, their perception goes through different stages. If initially the complication of the image and its approximation to the real image of a person makes a favourable impression, then there comes a moment of fright and rejection. Masahiro Mori called it the «uncanny valley» effect. Since then, all new technologies for presenting human images have been tested in order to avoid this effect. This
Gli stili APA, Harvard, Vancouver, ISO e altri
13

SONKUSARE, MAYURI, and NITIN JANWE. "Review of Digital Image Sharing By Diverse Image Media." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 07 (2015): 1917–22. https://doi.org/10.5281/zenodo.14786663.

Testo completo
Abstract (sommario):
A natural-image-based VSS scheme (NVSS scheme) that shares secret images. A natural-imagebased secret image sharing scheme (NSISS) that can share a color secret image over n - 1 arbitrary natural images and one noise-like share image. Instead of altering the contents of the natural images, the encryption process extracts feature images from each natural image. In order to protect the secret image from transmission phase. (n, n) - NVSS scheme shared secret image over n-1 natural share. The natural shares will be digital image and printed image. By extracting the features of natural shares we ca
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Eraso, Francisco Eduardo, William C. Scarfe, Yoshihiko Hayakawa, Jane Goldsmith, and Allan G. Farman. "Teledentistry: protocols for the transmission of digitized radiographs of the temporomandibular joint." Journal of Telemedicine and Telecare 2, no. 4 (1996): 217–23. http://dx.doi.org/10.1258/1357633961930103.

Testo completo
Abstract (sommario):
Tomograms of the temporomandibular joint were digitized in three different formats using a PC-based system. The image resolution for various projections was determined at different camera-film distances. Three series of images were transmitted by telephone, and transmission times were measured. The original radiographs, the digitized images, the transmitted images and the transmitted-and-printed images were presented to 10 observers, who were asked to rate image quality. No difference in image quality was found between the initial digitized and the transmitted images. However, transmitted and
Gli stili APA, Harvard, Vancouver, ISO e altri
15

THAKUR, NEELIMA, SIDDHARTHA CHOUBEY, and ABHA CHOUBEY. "IMAGE ENCRYPTION METHOD FOR SECURE IMAGE TRANSMISSION." i-manager’s Journal on Image Processing 8, no. 4 (2021): 21. http://dx.doi.org/10.26634/jip.8.4.18489.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Liu, Zhishen. "Underwater image transmission and blurred image restoration." Optical Engineering 40, no. 6 (2001): 1125. http://dx.doi.org/10.1117/1.1364500.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Adeyinka, Michael. "Telepathological (image transmission) configuration." Journal of Telemedicine and Telecare 2, no. 1 (1996): 21–24. http://dx.doi.org/10.1258/1357633961929763.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

B. Hebbale, Sunil, V. S. Giridhar Akula, and Parashuram Baraki. "Tuna Swarm Optimization with 3D-chaotic map and DNA encoding for image encryption with lossless image compression based on FPGA." International journal of electrical and computer engineering systems 14, no. 1 (2023): 59–72. http://dx.doi.org/10.32985/ijeces.14.1.7.

Testo completo
Abstract (sommario):
Images and video-based multimedia data are growing rapidly due to communication network technology. During image compression and transmission, images are inevitably corrupted by noise due to the influence of the environment, transmission channels, and other factors, resulting in the damage and degradation of digital images. Numerous real-time applications, such as digital photography, traffic monitoring, obstacle detection, surveillance applications, automated character recognition, etc are affected by this information loss. Therefore, the efficient and safe transmission of data has become a v
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Rizal, Syamsul, and Dong-Seong Kim. "Image Transmission in Military Network Using Bézier Curve." Journal of Advances in Computer Networks 3, no. 2 (2015): 141–45. http://dx.doi.org/10.7763/jacn.2015.v3.156.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Jin, Long Xu, Jin Li, and Xian Peng Hao. "Design of Image Transmission System for Multi Channel Panchromatic TDICCD Camera with Large Field of View." Applied Mechanics and Materials 380-384 (August 2013): 3758–61. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3758.

Testo completo
Abstract (sommario):
In order to satisfy the transmission of mass data volume of on-board time delay integration charge coupled devices (TDICCD) image, a high speed image transmission system of space panchromatic TDICCD camera with a large field of view is designed in this paper. A 4-channel parallel high speed transmission system for 16-channel CCD image was designed. A high speed serializer TLK2711 is applied to send and receive multi channel TDICCD images. A single chip TLK2711 can processing 4 channels image. Experimental results show that the designed transmission system can reliably work. The designed transm
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Duong, Hien-Thuan, Ca V. Phan, Quoc-Tuan Vien, and Tuan T. Nguyen. "A Secure Cooperative Transmission of Image Super-Resolution in Wireless Relay Networks." Electronics 12, no. 18 (2023): 3764. http://dx.doi.org/10.3390/electronics12183764.

Testo completo
Abstract (sommario):
The image transmission over wireless media experiences not only unavailable performance loss caused by the environment and hardware issues, but also information leakage to eavesdroppers who can overhear and attempt to recover the images. This paper proposes a secure cooperative relaying (SCR) protocol for the image communications in wireless relay networks (WRNs) where Alice sends high-resolution (HR) images to Bob with the assistance of a relaying user named Relay, and in the presence of an eavesdropper named Eve. In order to enhance the security of the image communications, random linear net
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Ch, Gangadhar, and Md Habibulla. "Lucas Algorithm for Medical Images Encryption and Transmission using Orthogonal Frequency Division Multiplexing for Medical Health Information Systems and its VLSI Realization." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 06 (2021): 128. http://dx.doi.org/10.3991/ijoe.v17i06.23107.

Testo completo
Abstract (sommario):
<p>Security of medical images is critical for transmission of medical images and relevant patient information through public health information systems networks. Image encryption is an important tool for protecting Medical images by converting them into unrecognisable formats for the transmission and receiption of medical images. This paper proposes an algorithm for medical image encryption using Lucas Algorithm, and a discrete wavelet transform based transmission and reception technique, which is known as orthogonal frequency division multiplexing(OFDM). This paper presents an implement
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Liu, Fulong, Gang Li, Shuqiang Yang, Wenjuan Yan, Guoquan He, and Ling Lin. "Recognition of Heterogeneous Edges in Multiwavelength Transmission Images Based on the Weighted Constraint Decision Method." Applied Spectroscopy 74, no. 8 (2020): 883–93. http://dx.doi.org/10.1177/0003702820908951.

Testo completo
Abstract (sommario):
Multiwavelength light transmission imaging provides a possibility for early detection of breast cancer. However, due to strong scattering during the transmission process of breast tissue analysis, the transmitted image signal is weak and the image is blurred and this makes heterogeneous edge detection difficult. This paper proposes a method based on the weighted constraint decision (WCD) method to eliminate the erosion and checkerboard effects in image histogram equalization (HE) enhancement and to improve the recognition of heterogeneous edge. Multiwavelength transmission images of phantom ar
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Shankar, K., and E. Perumal. "ANT COLONY OPTIMIZATION BASED OPTIMAL STEGANOGRAPHY TECHNIQUE FOR SECRET IMAGE SHARING SCHEME." Advances in Mathematics: Scientific Journal 10, no. 1 (2021): 453–61. http://dx.doi.org/10.37418/amsj.10.1.45.

Testo completo
Abstract (sommario):
Data hiding earlier to transmission remains as an essential process for reducing the security issues in the cloud based environment. Image encryption and steganography techniques verify the safety of secret data during the transmission over the Internet. This paper presents a new multiple secret share creation (SSC) with ant colony optimization (ACO) based image steganography (SSC-ACO) technique to achieve security over image transmission. Initially, SSC algorithm is applied to generate a set of different shares for the applied image. Then, the ACO algorithm based image steganography technique
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Chaturvedi, Soumya. "Different Type of Image Compression using Various techniques, Highlighting Segmentation based image Compression." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (2022): 171–77. http://dx.doi.org/10.22214/ijraset.2022.40207.

Testo completo
Abstract (sommario):
Abstract: Image compression (IC) plays an important part in Digital Image Processing (DIP), it is as well very very essential for effective transmission and storing of images. Image Compression (IC), is basically recusing the size of an image and that too without adjusting the quality of the picture. It is kind of software with records pressure on digital Image. The objective is to lessen reiteration of the picture info for you to be accomplished of store or transmit information in a proficient shape. This paper gives review of kinds of images and its compression strategies. An image, in its g
Gli stili APA, Harvard, Vancouver, ISO e altri
26

SACHIN., R. PRASAD, RAJ.H SUNIL, K. AKSHATH, PRADEEP.M.R., and PRIYA.R.SANKPAL. "COMPARATIVE STUDY OF TECHNIQUES FOR IMAGE COMPRESSION." JournalNX - a Multidisciplinary Peer Reviewed Journal 3, no. 7 (2017): 112–16. https://doi.org/10.5281/zenodo.1420954.

Testo completo
Abstract (sommario):
 Now a days image storage and transmission has become one of the biggest concerns due to shortage of storage and delay in transmission. Therefore image compression is very much needed for faster transmission and saving of space. The existing technologies have a number of limitations like loss of information, lower compression ratios, lower PSNR and high compression time. Fractal image compression using quad tree decomposition and Huffman coding has been designed and used on a set of standard images like Lena, cameraman and baboon. The results obtained yield good compression ratio and PSNR
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Araki, Shunsuke, Ji-Han Wu, and Jun-Juh Yan. "Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption." Mathematics 12, no. 19 (2024): 2983. http://dx.doi.org/10.3390/math12192983.

Testo completo
Abstract (sommario):
This paper proposes a highly secure image encryption technique based on chaotic synchronization. Firstly, through the design of a synchronization controller, we ensure that the master–slave chaotic extremum-coded random number generators (ECRNGs) embedded in separated transmitters and receivers are fully synchronized to provide synchronized dynamic random sequences for image encryption applications. Next, combining these synchronized chaotic sequences with the AES encryption algorithm, we propose an image segmentation and multi-encryption method to enhance the security of encrypted images and
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Sridevi, P., and J. Suguna. "Image Encryption Using Arnold Map." Asian Journal of Computer Science and Technology 8, S1 (2019): 70–73. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1954.

Testo completo
Abstract (sommario):
Nowadays transmission of data over the network is increasing and the data can be in the format of text, image, audio and video. Images are widely used in maximum applications of daily life. Image encryption is one of the most recent area of research to meet the demand during image transmission. Transformation of image from one form to erroneous form is called as image encryption. So, it can be secured from unauthorized users. The security of encrypted image is completely dependent on two important aspects i.e. the strength of the cryptographic algorithm and the confidentiality of the key. This
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Wang, Jinyu, Yingna Li, and Wenxiang Chen. "UAV Aerial Image Generation of Crucial Components of High-Voltage Transmission Lines Based on Multi-Level Generative Adversarial Network." Remote Sensing 15, no. 5 (2023): 1412. http://dx.doi.org/10.3390/rs15051412.

Testo completo
Abstract (sommario):
With the aim of improving the image quality of the crucial components of transmission lines taken by unmanned aerial vehicles (UAV), a priori work on the defective fault location of high-voltage transmission lines has attracted great attention from researchers in the UAV field. In recent years, generative adversarial nets (GAN) have achieved good results in image generation tasks. However, the generation of high-resolution images with rich semantic details from complex backgrounds is still challenging. Therefore, we propose a novel GANs-based image generation model to be used for the critical
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Xiong, Jiang, Yong Pan, Zi Ye Hou, and Ren Zhang. "Research on the System of Image Acquisition and Wireless Transmission." Applied Mechanics and Materials 668-669 (October 2014): 1382–85. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.1382.

Testo completo
Abstract (sommario):
Image acquisition and wireless transmission is a key technology in the Internet of Things. This paper reports a ARM Cortex-M4 processor hand-held based Image acquisition and wireless transmission terminal. The terminal utilizes STM32F407VGT6 as its master controller, respectively. It uses Nordic nRF24L01 as its wireless transceiver module and OV9655 as its camera module. The system works in 2.4GHz ISM microwave band and can capture images and wirelessly transmit images within 20m indoors and 50m outdoors. The actual measurement of image acquisition and transmission shows that this terminal is
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Rao, K. Srinivasa, S. Ramya, N. Ramyasri, and M. Sirisha. "A Dehazing Benchmark with Real Hazy Outdoor Images." International Journal of Advance Research and Innovation 8, no. 2 (2020): 59–63. http://dx.doi.org/10.51976/ijari.822010.

Testo completo
Abstract (sommario):
A single image dehazing is one of the problemin image processing. The main aim of using this method is to obtain certain transmission map to abolish hazes from a single input image. An optical model is evaluated and the basic transmission map under an additional filter is modified. For better conservation of haze image, the globally guided image filtering can be applied to produce sharper images and preserves details in regions of fine structure visibly.
Gli stili APA, Harvard, Vancouver, ISO e altri
32

De, Kanjar, and Masilamani V. "NO-REFERENCE IMAGE QUALITY MEASURE FOR IMAGES WITH MULTIPLE DISTORTIONS USING RANDOM FORESTS FOR MULTI METHOD FUSION." Image Analysis & Stereology 37, no. 2 (2018): 105. http://dx.doi.org/10.5566/ias.1534.

Testo completo
Abstract (sommario):
Over the years image quality assessment is one of the active area of research in image processing. Distortion in images can be caused by various sources like noise, blur, transmission channel errors, compression artifacts etc. Image distortions can occur during the image acquisition process (blur/noise), image compression (ringing and blocking artifacts) or during the transmission process. A single image can be distorted by multiple sources and assessing quality of such images is an extremely challenging task. The human visual system can easily identify image quality in such cases, but for a c
Gli stili APA, Harvard, Vancouver, ISO e altri
33

J, S. Dhobi, and Shah Jalpa. "Chaos Based Image Encryption Technique." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 2289–91. https://doi.org/10.31142/ijtsrd12733.

Testo completo
Abstract (sommario):
Due to internet explosion there has been considerable rise in transmission of data such as tex, images, text, videos, etc over internet. Here security is required for transmission of data over internet so that data is secure from sender to receiver. Image Encryption plays an important role for image transmission over the Internet and using chaos system prove more secure than existing traditional cryptographic algorithms like AES, RC5, etc. With Image Encryption it becomes difficult to analyze the image that is communicated over untrusted network.. The paper provides an introduction to Chaos sy
Gli stili APA, Harvard, Vancouver, ISO e altri
34

HAMAMACHI, Yuya, and Masamitsu KURISU. "Transmitting Multiple Images and a Providing Panoramic Image Using Single Image Transmission System." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2018 (2018): 2A2—B02. http://dx.doi.org/10.1299/jsmermd.2018.2a2-b02.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Zhang, Ping, Jingfeng Jie, Zhi Liu, and Keyan Dong. "Chaotic Image Encryption System as a Proactive Scheme for Image Transmission in FSO High-Altitude Platform." Photonics 12, no. 7 (2025): 635. https://doi.org/10.3390/photonics12070635.

Testo completo
Abstract (sommario):
To further enhance the stability and security of image transmission in FSO (Free Space Optics) aviation platforms, this paper proposes a communication transmission scheme that integrates a chaotic image encryption system with the HAP (high-altitude platform) environment. This scheme effectively combines the chaotic image encryption algorithm with the atmospheric turbulence channel transmission process, improving the anti-interference capabilities and security of HAP optical communication for image transmission. First, a five-dimensional hyperchaotic system with complex dynamic characteristics
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Jin, Yong. "Quality of Service aware Medical CT Image Transmission Anti-collision Mechanism Based on Big Data Autonomous Anti-collision Control." Current Bioinformatics 14, no. 7 (2019): 676–83. http://dx.doi.org/10.2174/1574893613666180502111320.

Testo completo
Abstract (sommario):
Background: At present, due to the limitation of hardware, software and network transmission performance, the medical diagnosis of medical CT image equipment is easy to be carried out based on the wrong image. In addition, due to the complex structure of human organs and unpredictable lesion location, it is difficult to judge the reliability of medical CT images, spatial localization of the lesion, two-dimensional slice images and shape based on stereotypes. Therefore, how to improve the efficiency of medical CT terminal and the image quality has become the key technology to improve the satisf
Gli stili APA, Harvard, Vancouver, ISO e altri
37

S., Angelin Nivedita, and T. Priyaradhikadevi Dr. "Image Realization Steganography by Secure Key Transmission." International Journal of Trend in Scientific Research and Development 2, no. 2 (2018): 1460–64. https://doi.org/10.31142/ijtsrd9654.

Testo completo
Abstract (sommario):
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data hiding key, can extract the additional data though the image content is not known. If the receiver has the encryption key, then can decrypt the received data t
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Fadhel, Sabah, Mohd Shafry, and Omar Farook. "Chaos Image Encryption Methods: A Survey Study." Bulletin of Electrical Engineering and Informatics 6, no. 1 (2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.

Testo completo
Abstract (sommario):
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and co
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Sabah, Fadhel, Shafry Mohd, and Farook Omar. "Chaos Image Encryption Methods: A Survey Study." Bulletin of Electrical Engineering and Informatics 6, no. 1 (2017): 99–104. https://doi.org/10.11591/eei.v6i1.599.

Testo completo
Abstract (sommario):
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES, DES, RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Vasanth Raj, P. T., A. Vijayaraj, K. Pradeep, and Ebenezer Lartey Debrah. "Self-Super-Resolution of an MRI Image with Assistance of the DSTTD System." Journal of Healthcare Engineering 2022 (November 24, 2022): 1–11. http://dx.doi.org/10.1155/2022/3376079.

Testo completo
Abstract (sommario):
Motivation. In the modern world of information technology, the need for ensuring the safety of wireless transmissions while transiting through a given network is growing rapidly. The process of transmitting images via a wireless network is fraught with difficulty. There is a possibility that data may be corrupted while being transmitted, which would result in an image with low resolution. Both of these issues were investigated head-on in this research methodology using the aiding double space-time block coding (DSTTD) system and the self-super-resolution (SSR) method. Description. In recent ti
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Lichte, Hannes. "Electron Holography Improving Transmission Electron Microscopy." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 1 (1990): 208–9. http://dx.doi.org/10.1017/s0424820100179798.

Testo completo
Abstract (sommario):
Generally, the electron object wave o(r) is modulated both in amplitude and phase. In the image plane of an ideal imaging system we would expect to find an image wave b(r) that is modulated in exactly the same way, i. e. b(r) =o(r). If, however, there are aberrations, the image wave instead reads as b(r) =o(r) * FT(WTF) i. e. the convolution of the object wave with the Fourier transform of the wave transfer function WTF . Taking into account chromatic aberration, illumination divergence and the wave aberration of the objective lens, one finds WTF(R) = Echrom(R)Ediv(R).exp(iX(R)) . The envelope
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Qin, Hongshuai, and Huibin Qin. "Image-Based Dedicated Methods of Night Traffic Visibility Estimation." Applied Sciences 10, no. 2 (2020): 440. http://dx.doi.org/10.3390/app10020440.

Testo completo
Abstract (sommario):
Traffic visibility is an essential reference for safe driving. Nighttime conditions add to the difficulty of estimating traffic visibility. To estimate the visibility in nighttime traffic images, we propose a Traffic Sensibility Visibility Estimation (TSVE) algorithm that combines laser transmission and image processing and needs no reference to the corresponding fog-free images and camera calibration. The information required is first obtained via the roadside equipment which collects environmental data and captures road images and then analyzed locally or remotely. The proposed analysis incl
Gli stili APA, Harvard, Vancouver, ISO e altri
43

M, Anand, and V. Mathivananr. "Quantization Encoding Algorithm Based Satellite Image Compression." Indonesian Journal of Electrical Engineering and Computer Science 8, no. 3 (2017): 740. http://dx.doi.org/10.11591/ijeecs.v8.i3.pp740-742.

Testo completo
Abstract (sommario):
In the field of digital data there is a demand in bandwidth for the transmission of the videos and images all over the worlds. So in order to reduce the storage space in the field of image applications there is need for the image compression process with lesser transmission bandwidth. So in this paper we are proposing a new image compression technique for the compression of the satellite images by using the Region of Interest (ROI) based on the lossy image technique called the Quantization encoding algorithm for the compression. The performance of our method can be evaluated and analyzing the
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Al Najjar, Ali Saleh. "Implementation Color-Images Cryptography Using RSA Algorithm." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 11 (2017): 181. http://dx.doi.org/10.23956/ijarcsse.v7i11.500.

Testo completo
Abstract (sommario):
Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high se
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Heri Prasetyo, Heri Prasetyo, Alim Wicaksono Hari Prayuda Heri Prasetyo, Chih-Hsien Hsia Alim Wicaksono Hari Prayuda, and Muhammad Alif Wisnu Chih-Hsien Hsia. "Integrating Companding and Deep Learning on Bandwidth-Limited Image Transmission." 網際網路技術學刊 23, no. 3 (2022): 467–73. http://dx.doi.org/10.53106/160792642022052303005.

Testo completo
Abstract (sommario):
<p>The image companding is a simple image compression technique which is very easy to be implemented in the bandwidth-limited environment. This paper presents a simple way for improving the quality of decompressed image in the image companding task. The proposed method consists of two networks, namely Sub-band Network (SubNet) and Pixel Network (PixNet), for performing an image reconstruction. The SubNet module exploits the effectiveness of Stationary Wavelet Transform (SWT) and Convolutional Neural Network (CNN) in order to recover the lost information in the wavelet sub-bands basis. Wh
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Zheng, Jianhua, Ruolin Zhao, Gaolin Yang, et al. "An Underwater Image Restoration Deep Learning Network Combining Attention Mechanism and Brightness Adjustment." Journal of Marine Science and Engineering 12, no. 1 (2023): 7. http://dx.doi.org/10.3390/jmse12010007.

Testo completo
Abstract (sommario):
This study proposes Combining Attention and Brightness Adjustment Network (CABA-Net), a deep learning network for underwater image restoration, to address the issues of underwater image color-cast, low brightness, and low contrast. The proposed approach achieves a multi-branch ambient light estimation by extracting the features of different levels of underwater images to achieve accurate estimates of the ambient light. Additionally, an encoder-decoder transmission map estimation module is designed to combine spatial attention structures that can extract the different layers of underwater image
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Kinosita, K., H. Itoh, S. Ishiwata, K. Hirano, T. Nishizaka, and T. Hayakawa. "Dual-view microscopy with a single camera: real-time imaging of molecular orientations and calcium." Journal of Cell Biology 115, no. 1 (1991): 67–73. http://dx.doi.org/10.1083/jcb.115.1.67.

Testo completo
Abstract (sommario):
A new microscope technique, termed "W" (double view video) microscopy, enables simultaneous observation of two different images of an object through a single video camera or by eye. The image pair may, for example, be transmission and fluorescence, fluorescence at different wavelengths, or mutually perpendicular components of polarized fluorescence. Any video microscope can be converted into a dual imager by simple insertion of a small optical device. The continuous appearance of the dual image assures the best time resolution in existing and future video microscopes. As an application, orient
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Gou, Ming, Hao Tang, Lei Song, et al. "Research on Defect Diagnosis of Transmission Lines Based on Multi-Strategy Image Processing and Improved Deep Network." Processes 12, no. 9 (2024): 1832. http://dx.doi.org/10.3390/pr12091832.

Testo completo
Abstract (sommario):
The current manual inspection of transmission line images captured by unmanned aerial vehicles (UAVs) is not only time-consuming and labor-intensive but also prone to high rates of false detections and missed inspections. With the development of artificial intelligence, deep learning-based image recognition methods can automatically detect various defect categories of transmission lines based on images captured by UAVs. However, existing methods are often constrained by incomplete feature extraction and imbalanced sample categories, which limit the precision of detection. To address these issu
Gli stili APA, Harvard, Vancouver, ISO e altri
49

JIE, ZHANG, PAN RURU, and GAO WEIDONG. "A backlighting method for accurate inspection of woven fabric density." Industria Textila 68, no. 01 (2017): 31–36. http://dx.doi.org/10.35530/it.068.01.1321.

Testo completo
Abstract (sommario):
To inspect the yarn-dyed fabric density automatically, an efficient backlighting method is proposed in this paper. This method consists of four steps: fabric image acquisition, yarn skew detection, image threshold segmentation and binary image projection. Firstly, it is utilized an imaging acquisition system with two reflective and transmission lights in its top and bottom placements, and the reflective and transmission images of the same region in the fabric are captured respectively by adjusting the illumination condition. Secondly, the skew angles of yarns in transmission image are obtained
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Phankokkruad, Manop, and Wacharawichanant Sirirat. "Morphological Analysis of Particles in Transmission Electron Microscopy Image Using Image Processing." Advanced Materials Research 774-776 (September 2013): 1262–66. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1262.

Testo completo
Abstract (sommario):
The analysis of material particles in the transmission electron microscopy (TEM) image is the most important in the development and synthesis of the new materials for application in many fields. Manual identification is the hard work, spent a lot of time and inaccurate method. To solve this problem, the image processing is proposed for automatically identifies the material particles boundary and size in TEM images in or order to extract the useful data. The image processing method has been experimented on variety of TEM images and very promising results have been achieved given more accuracy.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!