Search alternatives:
structures » structure (Expand Search)
structural » structure (Expand Search)
unstructure » structure (Expand Search)
Showing 321 - 340 results of 53,535 for search '(((structures OR (structures OR structural)) OR unstructure) OR (structures OR structural)) data', query time: 0.43s Refine Results
  1. 321

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  2. 322
  3. 323

    Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure by Noor Ibraheem, Mokhtar Hasan

    Published 2020-12-01
    “…Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. …”
    Get full text
    Article
  4. 324
  5. 325

    A CDE-based data structure for radiotherapeutic decision-making in breast cancer by Fabio Dennstädt, Maximilian Schmalfuss, Johannes Zink, Janna Hastings, Roberto Gaio, Max Schmerder, Nikola Cihoric, Paul Martin Putora

    Published 2025-07-01
    “…Abstract Background The growing complexity of oncology and radiation therapy demands structured and precise data management strategies. The National Institutes of Health (NIH) have introduced Common Data Elements (CDEs) as a uniform approach to facilitate consistent data collection. …”
    Get full text
    Article
  6. 326

    Determination of Spatial-Temporal Correlation Structure of Troposphere Ozone Data in Tehran City by S.S. Mousavi, M. Mohammadzadeh

    Published 2013-06-01
    “…For eliminating the trend of data, a dynamic linear model is used, then some features of correlation structure of de-trended data, such as stationarity, symmetry and separability are considered. …”
    Get full text
    Article
  7. 327

    Research on Smart Scaling Mechanism and Structure for Big Data Network Server Groups by Hongyao Ju

    Published 2015-03-01
    “…The principle and construction of the structure of smart telescopic on big data network server groups were elaborated.The key technologies involved in the smart scaling of big data network server groups were discussed.After investigating key technologies,including the monitoring of the workload of the server group,the smart control of the number of servers,and the scheduling of access loads,the principle and realization method for the smart scaling of big data network server groups were proposed and technical supports were provided for the smart scaling and effective energy conservation of big data network server groups.According to the proposed construction method and key technologies,a smart scaling model for big data network server groups was provided as well.…”
    Get full text
    Article
  8. 328
  9. 329

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  10. 330
  11. 331
  12. 332

    RETRACTED: An Adaptive Hierarchical Network Model for Studying the Structure of Economic Network by Xiaoteng Yang, Zhenqiang Wu, Shumaila Javaid

    Published 2022-05-01
    “…In the presented dynamically evolving network model, new directed edges are generated depending on the existing nodes and the hierarchical structures among the network, and these edges decay over time. …”
    Get full text
    Article
  13. 333
  14. 334
  15. 335

    Modal Parameters Estimation of Building Structures from Vibration Test Data Using Observability Measurement by Jae-Seung Hwang, Hongjin Kim, Bong-Ho Cho

    Published 2015-01-01
    “…The numerical simulation is performed to evaluate the proposed procedure, and the results show that the modal participation factor and mode shapes are estimated from the structural responses accurately. The procedure is also applied to the experimental data obtained from the shaking table test of a three-story shear building model.…”
    Get full text
    Article
  16. 336
  17. 337
  18. 338

    Characterizing Subsurface Structures From Hard and Soft Data With Multiple‐Condition Fusion Neural Network by Zhesi Cui, Qiyu Chen, Jian Luo, Xiaogang Ma, Gang Liu

    Published 2024-11-01
    “…In this study, we introduce a multiple‐condition fusion network (MCF‐Net) to characterize subsurface structures based on both hard and soft data. To harness the full potential of multiple‐source subsurface observations, two distinct neural networks extract implicit features from hard and soft data. …”
    Get full text
    Article
  19. 339

    The intraorganic architecture of musculoskeletal structures in maxillofacial area of children according to x-ray diagnostics data

    Published 2020-04-01
    “…The combined use of the methods of teleradiography, computer and magnetic resonance imaging to study the structure of bone structures of MFA on the same object provides information that significantly reinforce the concept of morpho-functional unity of all structural components of the facial part of the head.…”
    Get full text
    Article
  20. 340

    A Method for Compressing Event Log Data Based on Combinatorial Generation Using AND/OR Tree Structures by Yuriy Shablya

    Published 2023-10-01
    “…Based on this idea, a method for compressing event log data based on combinatorial generation using AND/OR tree structures is proposed. …”
    Get full text
    Article