NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 490
1.
  • Efficient chain code compre... Efficient chain code compression with interpolative coding
    Žalik, Borut; Mongus, Domen; Lukač, Niko ... Information sciences, 20/May , Letnik: 439-440
    Journal Article
    Recenzirano

    This paper considers the use of interpolative coding for lossless chain code compression. The most popular chain codes are used, including Freeman chain code in eight (F8) and four directions (F4), ...
Celotno besedilo
2.
  • Internet of Things (IoT) Se... Internet of Things (IoT) Security with Blockchain Technology: A State-of-the-Art Review
    Khan, Abdullah Ayub; Laghari, Asif Ali; Shaikh, Zaffar Ahmed ... IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    With the rapid enhancement in the design and development of the Internet of Things creates a new research interest in the adaptation in industrial domains. It is due to the impact of distributed ...
Celotno besedilo
3.
  • Can burrows-Wheeler transfo... Can burrows-Wheeler transform be replaced in chain code compression?
    Žalik, Borut; Mongus, Domen; Lukač, Niko ... Information sciences, July 2020, 2020-07-00, Letnik: 525
    Journal Article
    Recenzirano

    Burrows-Wheeler Transform, followed by Move-To-Front Transform, are often used transformation techniques in data compression. They may reduce the information entropy of the input sequence, which ...
Celotno besedilo
4.
Celotno besedilo
5.
  • An efficient lossy cartoon ... An efficient lossy cartoon image compression method
    Jeromel, Aljaž; Žalik, Borut Multimedia tools and applications, 2020/1, Letnik: 79, Številka: 1-2
    Journal Article
    Recenzirano
    Odprti dostop

    This paper introduces a new lossy approach for compression of cartoon images. The image is firstly partitioned into regions of roughly the same colour. The chain codes are then determined of all ...
Celotno besedilo

PDF
6.
  • Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing
    Ayub Khan, Abdullah; Laghari, Asif Ali; M Baqasah, Abdullah ... PeerJ. Computer science, 03/2024, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the ...
Celotno besedilo
7.
  • Dynamic features based stro... Dynamic features based stroke recognition system for signboard images of Gurmukhi text
    Bains, Jasleen Kaur; Singh, Sukhdeep; Sharma, Anuj Multimedia tools and applications, 2021/1, Letnik: 80, Številka: 1
    Journal Article
    Recenzirano

    The computation of correct features is an essential phase for efficient data representation and benchmarked accuracy in text recognition systems. The offline text lacks dynamic information regarding ...
Celotno besedilo
8.
  • An efficient raster font co... An efficient raster font compression for embedded systems
    GLOBACNIK, Timotej; ZALIK, Borut Pattern recognition, 12/2010, Letnik: 43, Številka: 12
    Journal Article
    Recenzirano

    This paper presents a new lossless raster font compression method that uses vertex chain code to define character’s outline. Obtained chain codes are compressed by Huffman coding algorithm. The ...
Celotno besedilo
9.
  • Chain code compression with... Chain code compression with modified interpolative coding
    Žalik, Borut; Žalik, Krista Rizman; Zupančič, Eva ... Computers & electrical engineering, July 2019, 2019-07-00, 20190701, Letnik: 77
    Journal Article
    Recenzirano

    •Interpolative coding is efficient at chain code compression.•Interpolative coding is improved with Golomb coding.•Proper selection of Golomb parameter yields slightly better compression. A lossless ...
Celotno besedilo
10.
  • Proposing a new code by con... Proposing a new code by considering pieces of discrete straight lines in contour shapes
    Sanchez-Cruz, Hermilo Journal of visual communication and image representation, 05/2010, Letnik: 21, Številka: 4
    Journal Article
    Recenzirano

    Pattern substrings analysis to find high redundancy in binary shapes is carried out to improve compression levels in binary objects. Modifications of a recent set of symbols to encode arbitrary ...
Celotno besedilo
1 2 3 4 5
zadetkov: 490

Nalaganje filtrov