Gallery — Math

Gallery Items tagged Math

Show all Gallery Items

E5: Kern- und Teilchenphysik Übungsblatt 6
E5: Kern- und Teilchenphysik Übungsblatt 6
Übungsblatt 6
Jean Amadeus Elsner
Time-Frequency Analysis and the Wavelet Transform
Time-Frequency Analysis and the Wavelet Transform
A brief (lets not kid ourselves its long) introduction to the continuous and discrete wavelet transforms. Comments on implementations on the computer using MATLAB and other software is also included.
ryanplestid
Sine approximation
Sine approximation
A 5th order sine wave approximation
Pepijn de Vos de Vos
Resolucion pregunta 2 del parcial de osman
Resolucion pregunta 2 del parcial de osman
trabajo realizado para la cátedra de señales y sistemas
Josue Maldonado
Ejercicio 11 del 78, Baldor
Ejercicio 11 del 78, Baldor
Resuelva la ecuación
Wilson
Real Analysis I (Workshop 2)
Real Analysis I (Workshop 2)
Real Analysis Workshop 2 1.3.10
Philip Mak
Principio de identidad y del Argumento
Principio de identidad y del Argumento
Esta presentación algunas definiciones y resultados del análisis complejo; todas ellas presentadas con el fin de dar una prueba completa del principio de identidad y del principio del argumento. Referencias de la presentación: Basic Complex ANalysis, 3rd Ed. Jerrold E. Marsden, Michael J. Hoffman.
Diego Alejandro
Th\'eorie cin\'etique des gaz parfaits.
Th\'eorie cin\'etique des gaz parfaits.
Chapitre 2, Peip2, Polytech'Nice Sophia, sans les sch\'emas et applications sch\'ematis\'ees
Rémy Collie
Convolution Image-based Watermarking for 2D Greyscale Image
Convolution Image-based Watermarking for 2D Greyscale Image
Watermarking technique for the image is an efficient method for protecting copyright image, and also a huge topic in cryptography. In this paper, two spread spectrum watermarking scheme, the Convolution Image-based Model (CIM) and the Exponential Convolution Image-based Model (ECIM) are going to be formulated and discussed. The watermarking experiment result will be shown and discussed, focusing on the attack scheme, protectability, and the information encryption of the watermark. We will show that the convolution image-based model for invisible watermark is weak of protectability, but it is able to hide the information (the size of watermark must be less than the original image) and store inside the image.
Homer

Related Tags

PortugueseRésumé / CVPosterNewsletterHandoutTufteBosnianResearch DiaryInternational LanguagesTikZCommentingBibliographyUniversityFontsHomework AssignmentQuiz, Test, ExamAlgorithmTablesCzechDynamic FiguresConference PaperConference PresentationElectronicsTutorialPhysicsSource Code ListingSwedishFrenchPortuguese (Brazilian)GreekGetting StartedePubEssayExamSpanishGermanLuaLaTeXBrochurePresentationAcademic JournalThesisProject / Lab ReportBookCambridge UniversityKoreanNorwegianPolishMatricesBoise State UniversityFinnishBeamerXeLaTeXArabicChartsMATLABTwo-columnUniversity of Texas at AustinRomanianUniversity of CopenhagenUniversity of ReadingJapaneseIEEE (all)Worcester Polytechnic Institute (WPI)Universidade Federal do Rio Grande do SulVietnameseChineseFractalsIndian Institute of Technology MadrasUniversidade de São PauloCatalanCardiff UniversityFlorida State UniversityBloomsburg University of PennsylvaniaPontificia Universidad Católica de ChileRussianMoscow Aviation InstitutediacrTechResearch ProposalUniversidad Tecnológica de BolívarAmerican Physical Society (APS)PuzzleJournal of Statististical SoftwareLecture NotesUniversidad Nacional Autónoma de HondurasInstituto de Matemática e Estatística (IME-USP)DutchCheat sheetAdelphi UniversityWileyIcelandicUniversidade Federal de Ouro PretoAstronomy & AstrophysicsMasaryk UniversityWelshDePaul UniversityBahasa IndonesiaTurkishRoyal Statistical SocietyUniversité Laval SlovakUniversity of PennsylvaniaHungarianUniversity of WaterlooSociety for Industrial and Applied MathematicsTeaching Plan & SyllabusUniversity of OsloMongolianNortheastern UniversityManchester Metropolitan University