Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A Monitoring Method for Transmission Tower Foots Displacement Based on Wind-Induced Vibration Response

    Zhicheng Liu1, Long Zhao1,*, Guanru Wen1, Peng Yuan2, Qiu Jin1

    Structural Durability & Health Monitoring, Vol.17, No.6, pp. 541-555, 2023, DOI:10.32604/sdhm.2023.029760

    Abstract The displacement of transmission tower feet can seriously affect the safe operation of the tower, and the accuracy of structural health monitoring methods is limited at the present stage. The application of deep learning method provides new ideas for structural health monitoring of towers, but the current amount of tower vibration fault data is restricted to provide adequate training data for Deep Learning (DL). In this paper, we propose a DT-DL based tower foot displacement monitoring method, which firstly simulates the wind-induced vibration response data of the tower under each fault condition by finite element method. Then the vibration signal… More > Graphic Abstract

    A Monitoring Method for Transmission Tower Foots Displacement Based on Wind-Induced Vibration Response

  • Open Access

    ARTICLE

    Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method

    J. S. Sujin1,*, S. Sophia2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 157-171, 2023, DOI:10.32604/csse.2023.023747

    Abstract Digital picture forgery detection has recently become a popular and significant topic in image processing. Due to advancements in image processing and the availability of sophisticated software, picture fabrication may hide evidence and hinder the detection of such criminal cases. The practice of modifying original photographic images to generate a forged image is known as digital image forging. A section of an image is copied and pasted into another part of the same image to hide an item or duplicate particular image elements in copy-move forgery. In order to make the forgeries real and inconspicuous, geometric or post-processing techniques are… More >

  • Open Access

    ARTICLE

    Multi Sensor-Based Implicit User Identification

    Muhammad Ahmad1,*, Rana Aamir Raza2, Manuel Mazzara3, Salvatore Distefano4, Ali Kashif Bashir5, Adil Khan3, Muhammad Shahzad Sarfraz1, Muhammad Umar Aftab1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1673-1692, 2021, DOI:10.32604/cmc.2021.016232

    Abstract Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment. Therefore, when a device is stolen, a thief can have access to the owner’s personal information and services against the stored passwords. As a result of this potential scenario, this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors. A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features, then further optimized… More >

Displaying 1-10 on page 1 of 3. Per Page