Artykuły w czasopismach na temat „DCT TECHNIQUE”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „DCT TECHNIQUE”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Behl, Nipun, and Shivangi Katiyar. "Diagonally Assisted DCT Technique for Face Recognition: DA-DCT." International Journal of Computer Applications 141, no. 11 (2016): 11–15. http://dx.doi.org/10.5120/ijca2016909848.
Pełny tekst źródłaBaithoon, Nushwan Yousif. "Zeros Removal with DCT Image Compression Technique." Journal of Kufa for Mathematics and Computer 1, no. 3 (2011): 38–46. http://dx.doi.org/10.31642/jokmc/2018/010305.
Pełny tekst źródłaJyoti, Raghav, and Kumar Atul. "An Empirical Study of Coalescing a Bracketed Sequence of Images for High Resolution Image Acquisition." International Journal of Computer Science Issues 17, no. 5 (2020): 34–42. https://doi.org/10.5281/zenodo.4418888.
Pełny tekst źródłaBansal, Deepika, and Rita Chhikara. "An Improved DCT based Steganography Technique." International Journal of Computer Applications 102, no. 14 (2014): 46–49. http://dx.doi.org/10.5120/17887-8861.
Pełny tekst źródłasaid, Shaimaa A. El. "Efficient DCT-based image compression technique." International Journal of Signal and Imaging Systems Engineering 6, no. 4 (2013): 259. http://dx.doi.org/10.1504/ijsise.2013.056637.
Pełny tekst źródłaSudrajat, Ari, and Ayu Hendrati Rahayu. "Watermarking using DCT and DWT on Pneumonia images." Journal of Applied Intelligent System 8, no. 3 (2023): 273–86. http://dx.doi.org/10.33633/jais.v8i3.8914.
Pełny tekst źródłaBudiman, Donny, Andriyan B. Suksmono, and Donny Danudirdjo. "Fibonacci Sequence – based FFT and DCT Performance Comparison in Audio Watermarking." International Journal of Engineering & Technology 8, no. 1.9 (2019): 209–14. http://dx.doi.org/10.14419/ijet.v8i1.9.26401.
Pełny tekst źródłaShirakol, Shrikanth, and Kerur S S. "ARCHITECTURAL DESIGN AND OPTIMIZATION OF DISTRIBUTED ARITHMETIC BASED 2-D DISCRETE COSINE TRANSFORM." ICTACT Journal on Microelectronics 8, no. 1 (2022): 1275–82. http://dx.doi.org/10.21917/ijme.2022.0220.
Pełny tekst źródłaSaraiva, Aratã Andrade, Felipe Castro, Marcos Soares de Oliveira, and José Vigno Moura Sousa. "Identification of exonic regions in dna sequences an approach using cross-correlation and noise suppression by discrete cosine transform." Research, Society and Development 9, no. 9 (2020): e883998173. http://dx.doi.org/10.33448/rsd-v9i9.8173.
Pełny tekst źródłaKaur, Randeep, and Kamaljit Kaur Dhillon. "GRAYSCALE IMAGE WATERMARK DETECTION." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 100–105. http://dx.doi.org/10.24297/ijct.v3i1b.2748.
Pełny tekst źródłaRENDRAGRAHA, RENDY DWI, GELAR BUDIMAN, and IRMA SAFITRI. "QIM - Based Audio Watermarking with Combination Technique of DCT-QR-CPT." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 7, no. 1 (2019): 112. http://dx.doi.org/10.26760/elkomika.v7i1.112.
Pełny tekst źródłaPal, Suryakanta, Sudhakar Sahoo, and Birendra Kumar Nayak. "Deterministic Computing Techniques for Perfect Density Classification." International Journal of Bifurcation and Chaos 29, no. 05 (2019): 1950064. http://dx.doi.org/10.1142/s0218127419500640.
Pełny tekst źródłaKong, Hui Fang, and Yu Ning Qiu. "Analysis of the Solenoid Driving Technique for DCT." Advanced Materials Research 466-467 (February 2012): 1162–66. http://dx.doi.org/10.4028/www.scientific.net/amr.466-467.1162.
Pełny tekst źródłaGupta, Mukta, Prem Shanker Yadav, and Anubhav Bewerwal. "Blue Channel Replacement Technique for DCT-Compressed Image." International Journal of Applied Information Systems 4, no. 10 (2012): 20–23. http://dx.doi.org/10.5120/ijais12-450796.
Pełny tekst źródłaMiss., Nilam V. Kundlik*1 &. Mr. Manoj Kumar Singh2. "OSCILLATION AND DCT BASED BIOMEDICAL IMAGE COMPRESSION." OSCILLATION AND DCT BASED BIOMEDICAL IMAGE COMPRESSION 7, no. 6 (2018): 353–59. https://doi.org/10.5281/zenodo.1290477.
Pełny tekst źródłaSavale, Vaishali, and Tarunendra Bhadauria. "Different Techniques of Steganography in Images." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem39153.
Pełny tekst źródłaPratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.
Pełny tekst źródłaFranco Steier, Volker, Edgar Sobral Ashiuchi, Lutz Reißig, and José Alexander Araújo. "Effect of a Deep Cryogenic Treatment on Wear and Microstructure of a 6101 Aluminum Alloy." Advances in Materials Science and Engineering 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/1582490.
Pełny tekst źródłaJournal, Baghdad Science. "Combined DWT and DCT Image Compression Using Sliding RLE Technique." Baghdad Science Journal 8, no. 3 (2011): 832–39. http://dx.doi.org/10.21123/bsj.8.3.832-839.
Pełny tekst źródłaBaithoon, Nushwan Y. "Combined DWT and DCT Image Compression Using Sliding RLE Technique." Baghdad Science Journal 8, no. 3 (2011): 832–39. http://dx.doi.org/10.21123/bsj.2011.8.3.832-839.
Pełny tekst źródłaPooja S. Mali and Dr. Mahesh S. Chavan. "Evaluation of Image Forgery Detection Techniques using DCT, DWT and QCD." International Journal for Modern Trends in Science and Technology 11, no. 06 (2025): 221–25. https://doi.org/10.46501/ijmtst.26.v11.i06.
Pełny tekst źródłaGupta, Shilpi, Upena Dalal, and Vishnu Narayan Mishra. "Performance on ICI Self-Cancellation in FFT-OFDM and DCT-OFDM System." Journal of Function Spaces 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/854753.
Pełny tekst źródłaFalahi, Mr Moayad Al, and Dr Janaki Sivakumar. "Comparitive Analysis and Findings on Dct & Lbg Compression Techniques." International Journal of Engineering and Computer Science 9, no. 06 (2020): 25075–84. http://dx.doi.org/10.18535/ijecs/v9i06.4463.
Pełny tekst źródłaMechouek, Khaoula, Nasreddine Kouadria, Noureddine Doghmane, and Nadia Kaddeche. "Low Complexity DCT Approximation for Image Compression in Wireless Image Sensor Networks." Journal of Circuits, Systems and Computers 25, no. 08 (2016): 1650088. http://dx.doi.org/10.1142/s0218126616500882.
Pełny tekst źródłaLenthe, William C., McLean P. Echlin, Andreas Trenkle, Melanie Syha, Peter Gumbsch, and Tresa M. Pollock. "Quantitative voxel-to-voxel comparison of TriBeam and DCT strontium titanate three-dimensional data sets." Journal of Applied Crystallography 48, no. 4 (2015): 1034–46. http://dx.doi.org/10.1107/s1600576715009231.
Pełny tekst źródłaMuhammad, Fuad, and Ernawan Ferda. "Video steganography based on DCT psychovisual and object motion." Bulletin of Electrical Engineering and Informatics 9, no. 3 (2020): 1015–23. https://doi.org/10.11591/eei.v9i3.1859.
Pełny tekst źródłaDr Fadhil Salman Abed, and Nada Abdul Aziz Mustafa. "A proposed Technique for Information Hiding Based on DCT." International Journal of Advancements in Computing Technology 2, no. 5 (2010): 140–52. http://dx.doi.org/10.4156/ijact.vol2.issue5.16.
Pełny tekst źródłaHuang, Junqi, T. Nandha Kumar, and Haider Abbas. "Zigzag low-complexity approximate DCT using frequency upscaling technique." Journal of Physics: Conference Series 1962, no. 1 (2021): 012050. http://dx.doi.org/10.1088/1742-6596/1962/1/012050.
Pełny tekst źródła., Priya Porwal. "DIGITAL VIDEO WATERMARKING USING MODIFIED LSB AND DCT TECHNIQUE." International Journal of Research in Engineering and Technology 03, no. 04 (2014): 630–34. http://dx.doi.org/10.15623/ijret.2014.0304112.
Pełny tekst źródłaAmhammed, Aesha A. "A HYBRID IMAGE COMRESSION TECHNIQUE USING DFT AND DCT." International Journal of Science and Applied Information Technology 8, no. 6 (2019): 104–9. http://dx.doi.org/10.30534/ijsait/2019/158620198.
Pełny tekst źródłaLebcir, Mohamed, Suryanti Awang, and Ali Benziane. "Reversible Watermarking Technique for Fingerprint authentication based on DCT." IOP Conference Series: Materials Science and Engineering 769 (June 9, 2020): 012070. http://dx.doi.org/10.1088/1757-899x/769/1/012070.
Pełny tekst źródłaZhao, Y., G. Cheng, and S. Yu. "Postprocessing technique for blocking artifacts reduction in DCT domain." Electronics Letters 40, no. 19 (2004): 1175. http://dx.doi.org/10.1049/el:20046044.
Pełny tekst źródłaAsatryan, D. G., and J. Patera. "Edge-detection algorithm based on DCT continuous extension technique." Physics of Atomic Nuclei 71, no. 5 (2008): 795–99. http://dx.doi.org/10.1134/s1063778808050049.
Pełny tekst źródłaSherlock, B. G., and Y. P. Kakad. "Transform domain technique for windowing the DCT and DST." Journal of the Franklin Institute 339, no. 1 (2002): 111–20. http://dx.doi.org/10.1016/s0016-0032(01)00058-8.
Pełny tekst źródłaChoi, Yoonki, and Kiyoharu Aizawa. "Digital watermarking technique using block correlation of DCT coefficients." Electronics and Communications in Japan (Part II: Electronics) 85, no. 9 (2002): 23–31. http://dx.doi.org/10.1002/ecjb.10069.
Pełny tekst źródłaReddy, KVSV Trinadh, and S. Narayana Reddy. "An Improved Medical Image Watermarking Technique Based on Weber’s Law Descriptors." Traitement du Signal 38, no. 6 (2021): 1637–46. http://dx.doi.org/10.18280/ts.380607.
Pełny tekst źródłaRostam, Affendi Hamzah, Md Roslan Muttaqin, Fauzan bin Kadmin Ahmad, Fakhar bin Abd Gani Shamsul, and Azha A. Aziz Khairul. "JPG, PNG and BMP image compression using discrete cosine transform." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 3 (2021): 1010–16. https://doi.org/10.12928/telkomnika.v19i3.14758.
Pełny tekst źródłaELSHARKAWY, R. R., M. HINDY, S. EL-RABAIE, and M. I. DESSOUKY. "FET SMALL-SIGNAL MODELING USING MEL-FREQUENCY CEPSTRAL COEFFICIENTS AND THE DISCRETE COSINE TRANSFORM." Journal of Circuits, Systems and Computers 19, no. 08 (2010): 1835–46. http://dx.doi.org/10.1142/s0218126610007158.
Pełny tekst źródłaAlex Rajju Balan, J. A., and S. Edward Rajan. "A novel embedding technique for lossless data hiding in medical images employing histogram shifting method." International Journal of Wavelets, Multiresolution and Information Processing 12, no. 03 (2014): 1450026. http://dx.doi.org/10.1142/s021969131450026x.
Pełny tekst źródłaJalil, Alyaa Jaber. "Robust Digital Images Watermarking Technique Based on Eigenvectors." Journal of Education College Wasit University 2, no. 25 (2021): 1305–24. http://dx.doi.org/10.31185/eduj.vol2.iss25.2739.
Pełny tekst źródłaCedillo Hernández, Manuel, Mariko Nakano Miyatake, and Héctor Pérez Meana. "A robust watermarking technique based on image normalization." Revista Facultad de Ingeniería Universidad de Antioquia, no. 52 (March 7, 2013): 147–60. http://dx.doi.org/10.17533/udea.redin.14812.
Pełny tekst źródłaKaustubh, Toro, Kambali Avvaneppa, Hiremath Shrigouri, and B.Hebbale Sunil. "A Laplacian Pyramid based Image Fusion Technique." Advancement in Image Processing and Pattern Recognition 3, no. 2 (2020): 1–5. https://doi.org/10.5281/zenodo.3884162.
Pełny tekst źródłaWaqas, Ghulam Jilani, Ishtiaq Ahmad, Muhammad Kashif Samee, Muhammad Nasir Khan, and Ali Raza. "A hybrid OFDM–CDMA-based robust image watermarking technique." International Journal of Wavelets, Multiresolution and Information Processing 18, no. 06 (2020): 2050043. http://dx.doi.org/10.1142/s0219691320500435.
Pełny tekst źródłaKrishna Kumar Bohra and Vinod Kumar Soni. "Invisible watermarking using Discrete Cosine Transform (DCT): A comprehensive exploration." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 2639–45. https://doi.org/10.30574/wjarr.2024.24.2.3623.
Pełny tekst źródłaKrishna, Kumar Bohra, and Kumar Soni Vinod. "Invisible watermarking using Discrete Cosine Transform (DCT): A comprehensive exploration." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 2639–45. https://doi.org/10.5281/zenodo.15142381.
Pełny tekst źródłaJackson, Joshua Conrad, Michele J. Gelfand, Nailah Ayub, and Jasmine Wheeler. "Together from afar: Introducing a Diary Contact Technique for Improving Intergroup Relations." Behavioral Science & Policy 5, no. 1 (2019): 15–33. http://dx.doi.org/10.1177/237946151900500103.
Pełny tekst źródłaGupta, Gaurav, Amit Mahesh Joshi, and Kanika Sharma. "AN EFFICIENT ROBUST IMAGE WATERMARKING BASED ON AC PREDICTION TECHNIQUE USING DCT TECHNIQUE." ICTACT Journal on Image and Video Processing 06, no. 01 (2015): 1055–59. http://dx.doi.org/10.21917/ijivp.2015.0154.
Pełny tekst źródłaFeng, Gui, and Yi Min Yang. "Adaptive DCT Based Digital Watermarking Scheme." Applied Mechanics and Materials 20-23 (January 2010): 1136–42. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1136.
Pełny tekst źródłaEjaz, Umer, F. Y. Khuhawar, I. Bari, et al. "COMPARATIVE ANALYSIS OF LOSSY IMAGE COMPRESSION ALGORITHMS." Pakistan Journal of Scientific Research 3, no. 2 (2023): 136–47. http://dx.doi.org/10.57041/pjosr.v3i2.1043.
Pełny tekst źródłaSiddiqui, M. F., A. W. Reza, J. Kanesan, and H. Ramiah. "Investigation of a Novel Common Subexpression Elimination Method for Low Power and Area Efficient DCT Architecture." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/620868.
Pełny tekst źródła