Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (73)
  • Open Access

    ARTICLE

    A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region

    Kali Gurkahraman1,*, Rukiye Karakis2, Hidayet Takci1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 55-77, 2023, DOI:10.32604/csse.2023.037798 - 26 May 2023

    Abstract This study aimed to deal with three challenges: robustness, imperceptibility, and capacity in the image watermarking field. To reach a high capacity, a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques. The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm. To ensure robustness and imperceptibility, watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition. In the watermarking stage, the watermark image was weighted by the adaptive scaling factor More >

  • Open Access

    ARTICLE

    An Experimental Study on the Interaction between Hydrate Formation and Wax Precipitation in Waxy Oil-in-Water Emulsions

    Xincan Song1,3,4, Lin Wang1,3,4,*, Cheng Yu1,2, Jiaxin Chen1,3,4, Linjie Ma1,3,4

    Energy Engineering, Vol.120, No.8, pp. 1837-1852, 2023, DOI:10.32604/ee.2023.027637 - 05 June 2023

    Abstract The coupled formation of wax crystals and hydrates is a critical issue for the safety of deep-sea oil and gas exploration and subsea transport pipeline flow. Therefore, this paper conducts an experimental study on the characteristics of methane hydrate formation in a water-in-oil (W/O) system with different wax crystal contents and explores the influence of different initial experimental pressures on the induction period and maximum rate of hydrate formation. The wavelet function was introduced to process the reaction rate and calculate the maximum speed of hydrate formation. Notably, the higher the pressure, the smaller the… More >

  • Open Access

    ARTICLE

    APST-Flow: A Reversible Network-Based Artistic Painting Style Transfer Method

    Meng Wang*, Yixuan Shao, Haipeng Liu

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5229-5254, 2023, DOI:10.32604/cmc.2023.036631 - 29 April 2023

    Abstract In recent years, deep generative models have been successfully applied to perform artistic painting style transfer (APST). The difficulties might lie in the loss of reconstructing spatial details and the inefficiency of model convergence caused by the irreversible en-decoder methodology of the existing models. Aiming to this, this paper proposes a Flow-based architecture with both the en-decoder sharing a reversible network configuration. The proposed APST-Flow can efficiently reduce model uncertainty via a compact analysis-synthesis methodology, thereby the generalization performance and the convergence stability are improved. For the generator, a Flow-based network using Wavelet additive coupling… More >

  • Open Access

    ARTICLE

    Power Quality Improvement Using ANN Controller For Hybrid Power Distribution Systems

    Abdul Quawi1,*, Y. Mohamed Shuaib1, M. Manikandan2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3469-3486, 2023, DOI:10.32604/iasc.2023.035001 - 15 March 2023

    Abstract In this work, an Artificial Neural Network (ANN) based technique is suggested for classifying the faults which occur in hybrid power distribution systems. Power, which is generated by the solar and wind energy-based hybrid system, is given to the grid at the Point of Common Coupling (PCC). A boost converter along with perturb and observe (P&O) algorithm is utilized in this system to obtain a constant link voltage. In contrast, the link voltage of the wind energy conversion system (WECS) is retained with the assistance of a Proportional Integral (PI) controller. The grid synchronization is… More >

  • Open Access

    ARTICLE

    Crack Segmentation Based on Fusing Multi-Scale Wavelet and Spatial-Channel Attention

    Peng Geng*, Ji Lu, Hongtao Ma, Guiyi Yang

    Structural Durability & Health Monitoring, Vol.17, No.1, pp. 1-22, 2023, DOI:10.32604/sdhm.2023.018632 - 02 March 2023

    Abstract Accurate and reliable crack segmentation is a challenge and meaningful task. In this article, aiming at the characteristics of cracks on the concrete images, the intensity frequency information of source images which is obtained by Discrete Wavelet Transform (DWT) is fed into deep learning-based networks to enhance the ability of network on crack segmentation. To well integrate frequency information into network an effective and novel DWTA module based on the DWT and scSE attention mechanism is proposed. The semantic information of cracks is enhanced and the irrelevant information is suppressed by DWTA module. And the… More >

  • Open Access

    ARTICLE

    Extraction of Strain Characteristic Signals from Wind Turbine Blades Based on EEMD-WT

    Jin Wang1, Zhen Liu1,*, Ying Wang1, Caifeng Wen2,3, Jianwen Wang2,3

    Energy Engineering, Vol.120, No.5, pp. 1149-1162, 2023, DOI:10.32604/ee.2023.025209 - 20 February 2023

    Abstract Analyzing the strain signal of wind turbine blade is the key to studying the load of wind turbine blade, so as to ensure the safe and stable operation of wind turbine in natural environment. The strain signal of the wind turbine blade under continuous crosswind state has typical non-stationary and unsteady characteristics. The strain signal contains a lot of noise, which makes the analysis error. Therefore, it is very important to denoise and extract features of measured signals before signal analysis. In this paper, the joint algorithm of ensemble empirical mode decomposition (EEMD) and wavelet… More >

  • Open Access

    ARTICLE

    Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm

    Sachin Sharma1,*, Meena Malik2, Chander Prabha3, Amal Al-Rasheed4, Mona Alduailij4, Sultan Almakdi5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 393-407, 2023, DOI:10.32604/cmc.2023.033536 - 06 February 2023

    Abstract Watermarking of digital images is required in diversified applications ranging from medical imaging to commercial images used over the web. Usually, the copyright information is embossed over the image in the form of a logo at the corner or diagonal text in the background. However, this form of visible watermarking is not suitable for a large class of applications. In all such cases, a hidden watermark is embedded inside the original image as proof of ownership. A large number of techniques and algorithms are proposed by researchers for invisible watermarking. In this paper, we focus… More >

  • Open Access

    ARTICLE

    Hybrid Watermarking and Encryption Techniques for Securing Medical Images

    Amel Ali Alhussan1,*, Hanaa A. Abdallah2, Sara Alsodairi2, Abdelhamied A. Ateya3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 403-416, 2023, DOI:10.32604/csse.2023.035048 - 20 January 2023

    Abstract Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT… More >

  • Open Access

    ARTICLE

    Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 153-164, 2023, DOI:10.32604/csse.2023.034589 - 20 January 2023

    Abstract Unlike external attacks, insider threats arise from legitimate users who belong to the organization. These individuals may be a potential threat for hostile behavior depending on their motives. For insider detection, many intrusion detection systems learn and prevent known scenarios, but because malicious behavior has similar patterns to normal behavior, in reality, these systems can be evaded. Furthermore, because insider threats share a feature space similar to normal behavior, identifying them by detecting anomalies has limitations. This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete… More >

  • Open Access

    ARTICLE

    Application of Zero-Watermarking for Medical Image in Intelligent Sensor Network Security

    Shixin Tu, Yuanyuan Jia, Jinglong Du*, Baoru Han*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 293-321, 2023, DOI:10.32604/cmes.2023.022308 - 05 January 2023

    Abstract The field of healthcare is considered to be the most promising application of intelligent sensor networks. However, the security and privacy protection of medical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention. Fortunately, digital watermarking provides an effective method to solve this problem. In order to improve the robustness of the medical image watermarking scheme, in this paper, we propose a novel zero-watermarking algorithm with the integer wavelet transform (IWT), Schur decomposition and image block energy. Specifically, we first use IWT to extract low-frequency information and… More >

Displaying 11-20 on page 2 of 73. Per Page