You are currently on the new version of our website. Access the old version .

275 Results Found

  • Article
  • Open Access
2 Citations
3,667 Views
17 Pages

A Data Matrix Code Recognition Method Based on L-Shaped Dashed Edge Localization Using Central Prior

  • Yi Liu,
  • Yang Song,
  • Guiqiang Gu,
  • Jianan Luo,
  • Taoan Wang and
  • Qiuping Jiang

21 June 2024

The recognition of data matrix (DM) codes plays a crucial role in industrial production. Significant progress has been made with existing methods. However, for low-quality images with protrusions and interruptions on the L-shaped solid edge (finder p...

  • Article
  • Open Access
2,709 Views
12 Pages

Drop-on-demand printing using colloidal or pigmented inks is prone to the clogging of printing nozzles, which can lead to positional deviations and inconsistently printed patterns (e.g., data matrix codes, DMCs). However, if such deviations are detec...

  • Article
  • Open Access
9 Citations
9,389 Views
18 Pages

27 August 2021

We provide a comprehensive and in-depth overview of the various approaches applicable to the recognition of Data Matrix codes in arbitrary images. All presented methods use the typical “L” shaped Finder Pattern to locate the Data Matrix code in the i...

  • Article
  • Open Access
1 Citations
1,720 Views
27 Pages

DataMatrix Code Recognition Method Based on Coarse Positioning of Images

  • Lingyue Hu,
  • Guanbin Zhong,
  • Zhiwei Chen and
  • Zhong Chen

A DataMatrix (DM) code is an automatic identification barcode based on a combination of coding and image processing. Traditional DM code sampling methods are mostly based on simple segmentation and sampling of a DM code. However, the obtained DM code...

  • Article
  • Open Access
15 Citations
2,720 Views
20 Pages

In this paper, we propose a two-layer data hiding method by using the Hamming code to enhance the hiding capacity without causing significantly increasing computation complexity for AMBTC-compressed images. To achieve our objective, for the first lay...

  • Article
  • Open Access
6 Citations
1,674 Views
13 Pages

A Matrix Coding-Oriented Reversible Data Hiding Scheme Using Dual Digital Images

  • Jui-Chuan Liu,
  • Ching-Chun Chang,
  • Yijie Lin,
  • Chin-Chen Chang and
  • Ji-Hwei Horng

26 December 2023

With the development of Internet technology, information security and data protection have become particularly important. Reversible data hiding is an effective technique for data integrity and privacy protection, and secret image sharing is a distin...

  • Article
  • Open Access
7 Citations
5,113 Views
12 Pages

2 February 2023

A novel approach to detect and decode direct-part-marked, low-contrast data matrix codes on polymer-based selective laser sintering manufactured parts, which is able to work on lightweight devices, is presented. Direct-part marking is a concept for l...

  • Article
  • Open Access
1 Citations
669 Views
17 Pages

With the increasing use of digital image compression technology, ensuring data integrity and security within the compression domain has become a crucial area of research. Absolute moment block truncation coding (AMBTC), an efficient lossy compression...

  • Article
  • Open Access
3 Citations
3,801 Views
12 Pages

Data Matrix Based Low Cost Autonomous Detection of Medicine Packages

  • José Lima,
  • Cláudia Rocha,
  • Luísa Rocha and
  • Paulo Costa

30 September 2022

Counterfeit medicine is still a crucial problem for healthcare systems, having a huge impact in worldwide health and economy. Medicine packages can be traced from the moment of their production until they are delivered to the costumers through the us...

  • Feature Paper
  • Article
  • Open Access
11 Citations
3,322 Views
16 Pages

19 October 2019

With the rapid development of smartphones, cloud storage, and wireless communications, protecting the security of compressed images through data transmission on the Internet has become a critical contemporary issue. A series of data hiding methods fo...

  • Article
  • Open Access
9 Citations
3,327 Views
17 Pages

A Novel Real Coded Genetic Algorithm for Software Mutation Testing

  • Deepti Bala Mishra,
  • Biswaranjan Acharya,
  • Dharashree Rath,
  • Vassilis C. Gerogiannis and
  • Andreas Kanavos

26 July 2022

Information Technology has rapidly developed in recent years and software systems can play a critical role in the symmetry of the technology. Regarding the field of software testing, white-box unit-level testing constitutes the backbone of all other...

  • Article
  • Open Access
6 Citations
6,897 Views
16 Pages

22 February 2022

A 2D barcode is a reliable way to provide lifetime traceability of parts that are exposed to harsh environments. However, there are considerable challenges in adopting mobile cameras to read symbols directly marked on metal surfaces. Images captured...

  • Article
  • Open Access
3 Citations
4,605 Views
19 Pages

25 July 2018

In order to enhance the reliability and anti-interference performance of wireless sensor network (WSN) data transmission, this paper designs the low power scheme of the WSN from the angle of error correction coding and proposes the hybrid check matri...

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,036 Views
20 Pages

Polar Code Parameter Recognition Algorithm Based on Dual Space

  • Hengyan Liu,
  • Zhaojun Wu,
  • Limin Zhang and
  • Wenjun Yan

11 August 2022

To improve the performance of polar code parameter recognition in the fields of intelligent communication, communication detection, and network countermeasures, we propose a new recognition scheme for the additive white Gaussian noise (AWGN) channel....

  • Article
  • Open Access
8 Citations
3,166 Views
16 Pages

18 September 2023

Artificial neural networks can solve various tasks in computer vision, such as image classification, object detection, and general recognition. Our comparative study deals with four types of artificial neural networks—multilayer perceptrons, pr...

  • Article
  • Open Access
38 Citations
18,193 Views
19 Pages

QR (quick response) Codes are one of the most popular types of two-dimensional (2D) matrix codes currently used in a wide variety of fields. Two-dimensional matrix codes, compared to 1D bar codes, can encode significantly more data in the same area....

  • Review
  • Open Access
21 Citations
13,368 Views
50 Pages

12 June 2023

Compressed sensing is an alternative to Shannon/Nyquist sampling for acquiring sparse or compressible signals. Sparse coding represents a signal as a sparse linear combination of atoms, which are elementary signals derived from a predefined dictionar...

  • Article
  • Open Access
117 Views
16 Pages

A Fast Method for Estimating Generator Matrixes of BCH Codes

  • Shunan Han,
  • Yuanzheng Ge,
  • Yu Shi and
  • Renjie Yi

The existing methods used for estimating generator matrixes of BCH codes, which are based on Galois Field Fourier transforms, need to exhaustively test all the possible codeword lengths and corresponding primitive polynomials. With the increase of co...

  • Article
  • Open Access
105 Citations
17,035 Views
26 Pages

SmartTags: IoT Product Passport for Circular Economy Based on Printed Sensors and Unique Item-Level Identifiers

  • Nenad Gligoric,
  • Srdjan Krco,
  • Liisa Hakola,
  • Kaisa Vehmas,
  • Suparna De,
  • Klaus Moessner,
  • Kristoffer Jansson,
  • Ingmar Polenz and
  • Rob van Kranenburg

30 January 2019

In this paper, we present a method that facilitates Internet of Things (IoT) for building a product passport and data exchange enabling the next stage of the circular economy. SmartTags based on printed sensors (i.e., using functional ink) and a modi...

  • Article
  • Open Access
3 Citations
6,140 Views
16 Pages

A Novel Aesthetic QR Code Algorithm Based on Hybrid Basis Vector Matrices

  • Jianfeng Lu,
  • Weiling Cheng,
  • Shanqing Zhang,
  • Li Li,
  • Zaorang Yang and
  • Chin-Chen Chang

25 October 2018

Recently, more and more research has focused on the beautification technology of QR (Quick Response) codes. In this paper, a novel algorithm based on the XOR (exclusive OR) mechanism of hybrid basis vector matrices and a background image synthetic st...

  • Article
  • Open Access
7 Citations
3,701 Views
27 Pages

Linear Computation Coding: A Framework for Joint Quantization and Computing

  • Ralf Reiner Müller,
  • Bernhard Martin Wilhelm Gäde and
  • Ali Bereyhi

20 July 2022

Here we introduce the new concept of computation coding. Similar to how rate-distortion theory is concerned with the lossy compression of data, computation coding deals with the lossy computation of functions. Particularizing to linear functions, we...

  • Article
  • Open Access
10 Citations
4,092 Views
16 Pages

WE-ASCA: The Weighted-Effect ASCA for Analyzing Unbalanced Multifactorial Designs—A Raman Spectra-Based Example

  • Nairveen Ali,
  • Jeroen Jansen,
  • André van den Doel,
  • Gerjen Herman Tinnevelt and
  • Thomas Bocklitz

25 December 2020

Analyses of multifactorial experimental designs are used as an explorative technique describing hypothesized multifactorial effects based on their variation. The procedure of analyzing multifactorial designs is well established for univariate data, a...

  • Article
  • Open Access
2 Citations
2,252 Views
22 Pages

A Low-Complexity and Asymptotically Optimal Coding Strategy for Gaussian Vector Sources

  • Marta Zárraga-Rodríguez,
  • Jesús Gutiérrez-Gutiérrez and
  • Xabier Insausti

2 October 2019

In this paper, we present a low-complexity coding strategy to encode (compress) finite-length data blocks of Gaussian vector sources. We show that for large enough data blocks of a Gaussian asymptotically wide sense stationary (AWSS) vector source, t...

  • Article
  • Open Access
1,113 Views
11 Pages

10 July 2024

This paper attempts to highlight the decoding capabilities of MDP convolutional codes over the erasure channel by defining them as discrete linear dynamical systems, with which the controllability property and the observability characteristics of lin...

  • Article
  • Open Access
1,027 Views
18 Pages

12 November 2024

Reversible data hiding (RDH) is an approach that emphasizes the imperceptibility of hidden confidential data and the restoration of the original cover image. To achieve these objectives at the same time, in this paper, we design a matrix-based crosso...

  • Feature Paper
  • Article
  • Open Access
9 Citations
3,063 Views
10 Pages

The goal of the study presented in this paper is to evaluate the performance of a proposed transmission scheme in multiuser multiple-input multiple-output (MIMO) configurations, via code reuse. Hence, non-orthogonal multiple access (NOMA) is performe...

  • Article
  • Open Access
4 Citations
3,471 Views
14 Pages

Real-Time Hyperspectral Video Acquisition with Coded Slits

  • Guoliang Tang,
  • Zi Wang,
  • Shijie Liu,
  • Chunlai Li and
  • Jianyu Wang

21 January 2022

We propose a real-time hyperspectral video acquisition system that uses coded slits. Conventional imaging spectrometers usually have scanning mechanisms that reduce the temporal resolution or sacrifice the spatial resolution to acquire spectral infor...

  • Article
  • Open Access
2,214 Views
14 Pages

19 October 2021

Raising to Object (RtoObj), like other types of Raising configurations, features a determiner phrase (DP) in a dual-clausal relationship with both the matrix and the embedded clauses. RtoO is possible in English and a few other languages, most famous...

  • Article
  • Open Access
10 Citations
5,715 Views
19 Pages

Efficient LDPC Encoder Design for IoT-Type Devices

  • Jakub Hyla,
  • Wojciech Sułek,
  • Weronika Izydorczyk,
  • Leszek Dziczkowski and
  • Wojciech Filipowski

28 February 2022

Low-density parity-check (LDPC) codes are known to be one of the best error-correction coding (ECC) schemes in terms of correction performance. They have been utilized in many advanced data communication standards for which the codecs are typically i...

  • Article
  • Open Access
3 Citations
1,489 Views
16 Pages

6 December 2023

As sensors operating at the edge continue to evolve, the amount of data that edge devices need to process is increasing. Cloud computing methods have been proposed to process complex data on edge devices that are powered by limited resources. However...

  • Feature Paper
  • Article
  • Open Access
17 Citations
6,512 Views
24 Pages

31 October 2018

This paper examines the morphological integration of nouns in bilingual children’s code-switching to investigate whether children adhere to constraints posited for adult code-switching. The changing nature of grammars in development makes the M...

  • Article
  • Open Access
2 Citations
2,834 Views
11 Pages

19 March 2022

An end-to-end joint source–channel (JSC) encoding matrix and a JSC decoding scheme using the proposed bit flipping check (BFC) algorithm and controversial variable node selection-based adaptive belief propagation (CVNS-ABP) decoding algorithm a...

  • Article
  • Open Access
9 Citations
3,882 Views
14 Pages

An Efficient LiDAR Point Cloud Map Coding Scheme Based on Segmentation and Frame-Inserting Network

  • Qiang Wang,
  • Liuyang Jiang,
  • Xuebin Sun,
  • Jingbo Zhao,
  • Zhaopeng Deng and
  • Shizhong Yang

7 July 2022

In this article, we present an efficient coding scheme for LiDAR point cloud maps. As a point cloud map consists of numerous single scans spliced together, by recording the time stamp and quaternion matrix of each scan during map building, we cast th...

  • Article
  • Open Access
10 Citations
7,038 Views
16 Pages

28 October 2016

Partial least squares (PLS) is one of the most commonly used supervised modelling approaches for analysing multivariate metabolomics data. PLS is typically employed as either a regression model (PLS-R) or a classification model (PLS-DA). However, in...

  • Article
  • Open Access
14 Citations
3,903 Views
24 Pages

2 July 2022

In this paper, we introduce the idea of the ‘visibility matrix’ for automated data entry form generation in low-code development platforms. We then focus on the problem of software development productivity in the area of automated softwar...

  • Article
  • Open Access
3 Citations
6,079 Views
17 Pages

Generating Photomosaics with QR Code Capability

  • Chin-Lin Li,
  • Yangcong Su and
  • Ran-Zan Wang

18 September 2020

A photomosaic is an image with two layers of visual information, including an overarching image that can be seen from a distance and a matrix of individual tile images when examined closely. This paper presents a method for generating photomosaics wi...

  • Article
  • Open Access
12 Citations
5,848 Views
25 Pages

Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network

  • Ramesh Velumani,
  • Hariharasitaraman Sudalaimuthu,
  • Gaurav Choudhary,
  • Srinivasan Bama,
  • Maranthiran Victor Jose and
  • Nicola Dragoni

12 April 2022

Advances in information technology have harnessed the application of Quick Response (QR) codes in day-to-day activities, simplifying information exchange. QR codes are witnessed almost everywhere, on consumables, newspapers, information bulletins, et...

  • Article
  • Open Access
1,065 Views
19 Pages

10 March 2025

Multi-input Multi-output Synthetic Aperture Radar (MIMO-SAR) systems significantly improve the performance of traditional SAR systems by providing more system freedom. However, in the working mode of the simultaneous transceiver, each receiving anten...

  • Feature Paper
  • Article
  • Open Access
2 Citations
2,899 Views
17 Pages

On the Reduction of Transmission Complexity in MIMO-WCDMA Frequency-Selective Fading Orientations via Eigenvalue Analysis

  • P. K. Gkonis,
  • D. I. Kaklamani,
  • I. S. Venieris,
  • C. T. Dervos,
  • M. T. Chrysomallis,
  • K. Siakavara and
  • G. A. Kyriakou

In this paper, a novel transmission strategy for Mutliple Input Multiple Output Wideband Code Division Multiple Access (MIMO-WCDMA) orientations operating in frequency-selective fading environments is investigated, in terms of overall algorithmic com...

  • Proceeding Paper
  • Open Access
2 Citations
1,287 Views
7 Pages

Personal Social Network Profile Authentication through Image Steganography

  • Subhadip Mukherjee,
  • Somnath Mukhopadhyay and
  • Sunita Sarkar

15 December 2023

In the era of digital communication and social networking, the authenticity and integrity of personal social network profiles have become crucial for establishing trust and ensuring secure interactions. Existing methods often suffer from vulnerabilit...

  • Article
  • Open Access
6 Citations
2,300 Views
17 Pages

Design of Chaotic Interleaver Based on Duffing Map for Turbo Code

  • Claudio Urrea,
  • John Kern and
  • Ricardo López-Escobar

30 November 2022

This article presents the performance analysis and comparison of turbo codes for several interleavers with short blockchains. According to the symmetry concept, turbo codes consist of two symmetric convolutional codes preceded by an interleaver. Some...

  • Article
  • Open Access
2 Citations
1,877 Views
11 Pages

Cloud storage is an indispensable part of cloud computing solutions and the security of its stored data has become a key issue in the research and application of cloud storage systems. To solve this problem, this paper studies the anti-eavesdropping...

  • Article
  • Open Access
7 Citations
2,537 Views
15 Pages

In this paper, we first designed Huffman code (HC)-based absolute moment block truncation coding (AMBTC). Then, we applied Huffman code (HC)-based absolute moment block truncation coding (AMBTC) to design a pixel pair-wise fragile image watermarking...

  • Article
  • Open Access
3 Citations
2,609 Views
19 Pages

21 September 2021

Cross-modal hashing technology is a key technology for real-time retrieval of large-scale multimedia data in real-world applications. Although the existing cross-modal hashing methods have achieved impressive accomplishment, there are still some limi...

  • Article
  • Open Access
4 Citations
2,522 Views
18 Pages

Dual Hashing Index Cancellable Finger Vein Template Based on Gaussian Random Mapping

  • Xueyou Hu,
  • Liping Zhang,
  • Huabin Wang,
  • Jian Zhou and
  • Liang Tao

28 January 2022

In the existing cancellable finger vein template protection schemes, the original biometric features cannot be well protected, which results in poor security. In addition, the performance of matching recognition performances after generating a cancel...

  • Article
  • Open Access
1 Citations
1,543 Views
13 Pages

9 February 2024

In this study, a similarity coefficient generation code system was established using the Monte Carlo Code for Advanced Reactor Design (McCARD) transport code and the MIG multi-correlated input sampling code. We considered the adjoint-based sensitivit...

  • Article
  • Open Access
4 Citations
4,156 Views
24 Pages

On a Simplified Approach to Achieve Parallel Performance and Portability Across CPU and GPU Architectures

  • Nathaniel Morgan,
  • Caleb Yenusah,
  • Adrian Diaz,
  • Daniel Dunning,
  • Jacob Moore,
  • Erin Heilman,
  • Calvin Roth,
  • Evan Lieberman,
  • Steven Walton and
  • Robert Robey
  • + 5 authors

28 October 2024

This paper presents software advances to easily exploit computer architectures consisting of a multi-core CPU and CPU+GPU to accelerate diverse types of high-performance computing (HPC) applications using a single code implementation. The paper descr...

  • Article
  • Open Access
178 Views
25 Pages

Fast Algorithms for Small-Size Type VII Discrete Cosine Transform

  • Marina Polyakova,
  • Aleksandr Cariow and
  • Mirosław Łazoryszczak

This paper presents new fast algorithms for the type VII discrete cosine transform (DCT-VII) applied to input data sequences of lengths ranging from 3 to 8. Fast algorithms for small-sized trigonometric transforms enable the processing of small data...

  • Article
  • Open Access
1 Citations
6,108 Views
12 Pages

11 May 2022

Quantitative and binary results are ubiquitous in biology. Inasmuch as an underlying genetic basis for the observed variation in these observations can be assumed, it is pertinent to infer the evolutionary relationships among the entities being measu...

of 6