Identifying and minimizing physiological artifacts in EEG is challenging because these artifacts may corrupt the underlying brain activity severely. In this work, we proposed a hybrid approach to detect/reduce EEG art...
详细信息
A system's capacity to identify whether a person has fallen is known as fall detection. People who fall have difficulty moving their muscles. Even without injuries, the elderly people are too exhausted to stand up...
详细信息
Traffic has been a major problem in recent times. Traffic management is a must for safer and faster transportation. Automatic smart signal controlling systems respond to day-to-day world traffic densities to provide p...
详细信息
Federated Learning (FL) permits the cooperative training of a joint model for several medical facilities while maintaining the decentralization of the data owing to privacy considerations. However, Federated optimizat...
详细信息
Terahertz imaging technology has been used in the field of security inspection due to its excellent perspective ability. However, the terahertz security inspection images have the problem of poor image quality and can...
详细信息
LoRa (Long Range) is a wireless communication technology, which has established itself in recent years as one of the most widely used LPWAN (Low-Power Wide-Area Network) technologies in various IoT (internet of things...
详细信息
To enhance the intelligence level of monitoring risk sources in the process of subway construction, this system deploys a variety of sensors in the target area using wireless sensor network technology. Relevant data f...
详细信息
A facial recognition system is a piece of technology that can match a human face from a database of images. It is often used for robust authentication. An Attendance Management System is a tool used by businesses to t...
详细信息
Color light field images encryption algorithm based on frequency domain DNA coding and integer wavelet transform (IWT) is introduced. First, the light field image is decomposed into sub-view images in the angular doma...
详细信息
internet is playing a major role in the modern era of faster communication. Information communicated over internet must be secured with robust encryption scheme to assure confidentiality. Encryption schemes using chao...
internet is playing a major role in the modern era of faster communication. Information communicated over internet must be secured with robust encryption scheme to assure confidentiality. Encryption schemes using chaotic maps provide high level of security to transmitted information. Robustness of cryptographic technique further improves with application of hyperchaos rather than lower dimensional chaotic maps. In this communication we have studied comparison between image encryption techniques developed based on 3D Lorenz chaotic system and 4D hyperchaos. Performance analysis of both the techniques are compared based on various parameters like key sensitivity analysis, key space analysis, histogram analysis, calculation of information entropy and correlation coefficients.
暂无评论