Search

Your search keyword '"Huffman codes"' showing total 407 results

Search Constraints

Start Over You searched for: Descriptor "Huffman codes" Remove constraint Descriptor: "Huffman codes" Search Limiters Full Text Remove constraint Search Limiters: Full Text
407 results on '"Huffman codes"'

Search Results

1. Social Network Forensics Analysis Model Based on Network Representation Learning.

2. Impact of LiDAR point cloud compression on 3D object detection evaluated on the KITTI dataset.

3. A Data Compression Method for Wellbore Stability Monitoring Based on Deep Autoencoder.

4. Subjective performance evaluation of bitrate allocation strategies for MPEG and JPEG Pleno point cloud compression.

5. Efficient Data Management in Agricultural IoT: Compression, Security, and MQTT Protocol Analysis.

6. Redundant Configuration Method of MEMS Sensors for Bottom Hole Assembly Attitude Measurement.

7. Deep Compressed Communication and Application in Multi-Robot 2D-Lidar SLAM: An Intelligent Huffman Algorithm.

8. Entropic Bounds on the Average Length of Codes with a Space.

9. Prefix Data Augmentation for Contrastive Learning of Unsupervised Sentence Embedding.

10. ADVANCES IN NETWORK SECURITY FOR A RESILIENT DIGITAL CYBERSPACE INFRASTRUCTURE.

11. A cryptographic method to have a secure communication of health care digital data into the cloud.

12. Improved Recognition of Kurdish Sign Language Using Modified CNN.

13. Reversible data hiding in encrypted images with multi-prediction and adaptive huffman encoding.

14. WAS: improved white-box cryptographic algorithm over AS iteration.

15. A COST AND POWER EFFICIENT MEDICAL IMAGE COMPRESSOR VLSI DESIGN WITH FUZZY DECISION AND BLOCK PARTITION FOR WIRELESS SENSOR NETWORKS.

16. An interpolation-based reversible data hiding scheme for internet of things applications.

17. The position-based compression techniques for DNN model.

18. Research on Time-Aware Group Query Method with Exclusion Keywords.

19. An Improved Image Compression Algorithm Using 2D DWT and PCA with Canonical Huffman Encoding.

20. Fast and Efficient Entropy Coding Architectures for Massive Data Compression.

21. Dingo algorithm-based forwarder selection and huffman coding to improve authentication.

22. Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding.

23. PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization.

24. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.

25. SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis.

26. Microarray Image Lossless Compression Using General Entropy Coders and Image Compression Standards.

27. A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory.

28. Two-Stage Robust Lossless DWI Watermarking Based on Transformer Networks in the Wavelet Domain.

29. Single-trial extraction of event-related potentials (ERPs) and classification of visual stimuli by ensemble use of discrete wavelet transform with Huffman coding and machine learning techniques.

30. Reversible Data Hiding in Encrypted Images Based on Hybrid Prediction and Huffman Coding.

31. "Peregrinos de la Puna" en la ciudad del Milagro: prácticas y espacialidades en torno al Santuario del Milagro de Salta.

32. GVLE: a highly optimized GPU-based implementation of variable-length encoding.

33. Joint synchronization and parameter estimation in OFDM signaling.

34. A robust mixed error coding method based on nonconvex sparse representation.

35. Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification.

36. Android malware category detection using a novel feature vector-based machine learning model.

37. Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training.

38. Reversible Data Hiding in Encrypted Images Based on an Adaptive Recognition Strategy for Blocks.

39. RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment.

40. KryptosChain—A Blockchain-Inspired, AI-Combined, DNA-Encrypted Secure Information Exchange Scheme.

41. Temperature Field Reconstruction Method for Acoustic Tomography Based on Multi-Dictionary Learning.

42. Energy-efficient canonical Huffman decoders on many-core processor arrays and FPGAs.

43. Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis.

44. Data Compression in LoRa Networks: A Compromise between Performance and Energy Consumption.

45. LIGHTWEIGHT COMPRESSION WITH ENCRYPTION BASED ON ASYMMETRIC NUMERAL SYSTEMS.

46. Advanced correlation method for bit position detection towards high accuracy data processing in industrial computer systems.

47. Optimal alphabet for single text compression.

48. LL‐FMC: Low‐latency frame memory compression scheme with high reconstructed quality.

49. A Comparison of Lossless Compression Algorithms for Altimeter Data.

50. Improved Maximum Access Delay Time, Noise Variance, and Power Delay Profile Estimations for OFDM Systems.

Catalog

Books, media, physical & digital resources