- Fuzzy and Soft Set Theory
- Fixed Point Theorems Analysis
- Advanced Steganography and Watermarking Techniques
- Advanced Algebra and Logic
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
- Mathematical Dynamics and Fractals
- Multi-Criteria Decision Making
- Advanced Topology and Set Theory
- Advanced Differential Equations and Dynamical Systems
- Quantum chaos and dynamical systems
- Advanced Data Compression Techniques
- Caveolin-1 and cellular processes
- Geometric and Algebraic Topology
- Surgical Simulation and Training
- Target Tracking and Data Fusion in Sensor Networks
- Cellular Automata and Applications
- Advanced Vision and Imaging
- Error Correcting Code Techniques
- Rough Sets and Fuzzy Logic
- Robotics and Sensor-Based Localization
- Graph theory and applications
- Anatomy and Medical Technology
- Markov Chains and Monte Carlo Methods
- Advanced Banach Space Theory
Nanjing Institute of Technology
2024
Nanjing University of Information Science and Technology
2021-2023
Sichuan University
2023
Shantou University
2020-2021
Beijing Institute of Technology
2016-2020
Intelligent Automation (United States)
2014
New Jersey Institute of Technology
1994-2005
Yuncheng University
2003
Both watermark structure and embedding strategy affect robustness of image watermarks. Where should watermarks be embedded in the discrete cosine transform (DCT) domain order for invisible to robust? Though many papers literature agree that perceptually significant components, dc components are explicitly excluded from embedding. In this letter, a new watermarking is proposed based on quantitative analysis magnitudes DCT host images. We argue more can achieved if since have much larger...
In this paper, we propose a self-synchronization algorithm for audio watermarking to facilitate assured data transmission. The synchronization codes are embedded into with the informative data, thus have ability. To achieve robustness, embed and hidden low frequency coefficients in DWT (discrete wavelet transform) domain. By exploiting time-frequency localization characteristics of DWT, computational load searching has been dramatically reduced, resolving contending requirements between...
A blind audio information bit hiding algorithm with effective synchronization is proposed in this paper. The embeds signals the time domain to resist attacks such as cropping while keeping computation for resynchronization lower. watermark placed blockwise DCT coefficients of original exploiting HAS (Human Audio System) features. To lower error rate extraction, error-correcting coding applied. experimental results show that hidden imperceptible robust caused by additive noise, MP3 coding,...
This paper investigates the feasibility of watermark embedding in discrete cosine transform (DCT) domain for binary images. Watermark is known to be difficult images due their nature. For frequency approach image watermarking, a post-embedding binarization necessary step ensure that watermarked still image. disturbs embedded and likely remove watermark. We have succeeded combating this interference by watermarks DC components DCT employing biased threshold. algorithm can applied general...
Robust audio watermarks present some challenges. In this paper, we propose a DWT-based watermarking algorithm to resist shifting and cropping. Synchronization codes are embedded into with informative watermark, thus the watermark generated has ability of self-synchronization. To achieve good robustness performance, embed synchronization low-frequency coefficients in DWT domain. By exploring time-frequency localization capability decrease computation load for searching effectively, resolve...
In this paper, we propose a DWT-based image-watermarking algorithm applying DS-CDMA. The improved orthogonal Gold sequences sets generated via m-sequences are used to spread spectrum of the watermark. CDMA encoded watermark is embedded into DWT domain by modulating selected coefficients image in fashion similar CDMA. Blind recovery data achieved analyzing watermarked and auto-correlation codes. proposed compared with existing watermarking schemes based on experimental results demonstrate...
The aim of the paper is to present three-variable generalizations fuzzy metric spaces in sense George and Veeramani from functional topological points view, respectively.From viewpoint generalization, we introduce a notion generalized 2-metric spaces, study their properties, point out that it also common generalization both tripled proposed by Tian et al. M-fuzzy Sedghi Shobe.Since ordinary norm same as up induced topology, keep our spirit on normed structures concept 2-normed...
Data hiding techniques have extensive applications and attracted much attention. However, one common drawback of virtually all current data methods is the fact that host image inevitably permanently distorted by some small amount noise due to itself Although distortion often quite small, it may not be acceptable for medical or military images. For these applications, stego-image cannot any distortion, a high capacity distortion-free algorithm palette proposed in this paper. By utilizing...
In this paper, the notions of L-internal relations and L-enclosed are introduced. They respectively defined to be crisp on LX satisfying a set axioms, which can used characterize L-topologies. It is shown that category relation spaces, spaces L-topological isomorphic. Moreover, relationships among relations, axioms separation investigated.
Abstract Let be an Anosov diffeomorphism whose linearization is irreducible. Assume that also absolutely partially hyperbolic where a weak stable subbundle considered as the center subbundle. We show if strong and unstable are jointly integrable, then dynamically coherent all foliations match corresponding linear foliation under conjugacy to . Moreover, admits finest dominated splitting in with dimensions matching those for , it has spectral rigidity along these subbundles. In dimension 4,...
You have accessJournal of UrologyTechnology & Instruments: Surgical Education Skills Assessment/Ureteroscopy II1 Apr 20121512 DEVELOPMENT, IMPLEMENTATION AND VALIDATION OF A SIMULATION-BASED CURRICULUM FOR ROBOT-ASSISTED SURGERY Andrew P. Stegemann, Thenkurussi Kesavadas, Shabnam Rehman, Mohamed Sharif, Amrith Rao, Nefertiti C. duPont, Yi Shi, Gregory E. Wilding, James M. Hassett, and Khurshid A. Guru StegemannAndrew Stegemann Buffalo, NY More articles by this author , KesavadasThenkurussi...
In this paper, the concepts of (L, M)-fuzzy internal relations and enclosed between two L-fuzzy sets are introduced. They defined respectively to be M-fuzzy subsets LX × satisfying a set axioms. A categorical approach is provided present these relations. It proved that category relation spaces, spaces topological isomorphic. addition, some naturally constructed from quasi-uniformities S-quasi-proximities.
In this paper, we mainly introduce the concept of lattice-valued betweenness relations and study its relationships with L-fuzzifying convex structures in depth. Such an extended relation is defined to be a map from X × complete lattice provided that fulfills set axioms. We also discuss among them other algebraic geometric structures. Moreover, category approach present relations. It shown spaces interval are isomorphic.
Pointwise pseudoquasi-metrics play an important role in the theory of lattice-valued topology ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$L$</tex-math></inline-formula> -topology). Bearing mind that closed balls and their relations with have historically attracted attention mathematicians, it is very surprising no has been paid to between pointwise balls. In this article, we first introduce concept...
You have accessJournal of UrologyTechnology & Instruments: Surgical Education Skills Assessment (1)1 Apr 2013886 DEVELOPMENT VALIDATION OF A COMPOSITE GRADING SCORING SYSTEM FOR ROBOT-ASSISTED SURGICAL TRAINING — THE ROBOTIC SKILLS ASSESSMENT SCALE Ashirwad Chowriappa, Syed Raza, Andrew Stegemann, Kamran Ahmed, Yi Shi, Gregory Wilding, Jihad H. Kaouk, James Peabody, Mani Menon, Thenkurussi Kesavadas, and Khurshid Guru ChowriappaAshirwad Chowriappa East Amherst, NY More articles by this...
In this article, we propose an efficient compression algorithm for very low-bit-rate video applications. The is based on (a) optical-flow motion estimation to achieve more accurate prediction fields; (b) discrete cosine transformation (DCT) coding of the vectors from reduce overheads; and (c) adaptive threshold technique match optical flow minimize residual errors. Unlike classic block-matching DCT schemes in MPEG-1/2 H.261/3, proposed uses compensation applied field instead predictive...
Arithmetic coding with embedded channel (ACECC) is an arithmetic approach in which the code points selected over [0-1) interval are kept within a certain minimum Hamming distance of each other. The decoding process utilizes this distance, knowledge source statistics, and self-synchronization property coding, to overcome errors. This paper explains how maximum posteriori probability symbol (MAPSD) implemented. We show joint source/channel can avoid catastrophic effect unrecoverable errors...
In this paper, we propose SpotNet: a fast, single stage, image-centric but LiDAR anchored approach for long range 3D object detection. We demonstrate that our to LiDAR/image sensor fusion, combined with the joint learning of 2D and detection tasks, can lead accurate very sparse support. Unlike more recent bird's-eye-view (BEV) sensor-fusion methods which scale $r$ as $O(r^2)$, SpotNet scales $O(1)$ range. argue such an architecture is ideally suited leverage each sensor's strength, i.e....
Advances in machine learning algorithms for sensor fusion have significantly improved the detection and prediction of other road users, thereby enhancing safety. However, even a small angular displacement sensor's placement can cause significant degradation output, especially at long range. In this paper, we demonstrate simple yet generic efficient multi-task approach that not only detects misalignment between different modalities but is also robust against them long-range perception. Along...