Positron emission tomography (PET) is a commonly used medical imaging modality, but it has high noise at low doses. To further optimize PET image reconstruction, this paper proposes a novel approach that incorporates ...
详细信息
With the advancement of technology, the use of IoT technology for information management of safety production in chemical industrial parks is of great significance. This article designs an emergency rescue system for ...
详细信息
ISBN:
(纸本)9798350375084;9798350375077
With the advancement of technology, the use of IoT technology for information management of safety production in chemical industrial parks is of great significance. This article designs an emergency rescue system for chemical industrial parks based on the internet of Things, which mainly consists of a main control module, infrared detection module, image acquisition module, voice prompt module, network transmission module, etc. This system adopts Zigbee wireless networking technology, which has the characteristics of easy operation, low power consumption, low cost, easy expansion, and easy maintenance. Practice has shown that in the social environment of energy conservation and emission reduction, the system has high application value.
This paper explores deep learning-based algorithms for electrocardiogram (ECG) signal processing and their applications in cardiac health monitoring. Initially, we provide an overview of the fundamental principles of ...
详细信息
IOTA (internet of Things Applications) protocol aims to provide a secure and trustworthy protocol for realizing data-value interactions between IoT devices, and it has become the next possible direction for the develo...
IOTA (internet of Things Applications) protocol aims to provide a secure and trustworthy protocol for realizing data-value interactions between IoT devices, and it has become the next possible direction for the development of Blockchain applications. IOTA protocol has the problem that the time-consuming cumulative weight update grows too fast with the increase of the number of transactions, this paper proposed an improved IOTA protocol based on optimal midway walk, the improved protocol uses cutting-edge transaction selection algorithm of weighted Monte Carlo Markov random walk to reduce cumulative weight update delay. Firstly, this improved IOTA protocol mainly ensures the efficiency of transaction confirmation without losing the security of consensus by introducing the optimal midway walk method, i.e., the starting point of each walk is chosen to depart at an optimal location. Secondly, this paper designs the indirect verification identity record algorithm and the layer degree of confirmation principle are designed to realize the improved IOTA protocol's resilience and resistance to Parasite chain attack. The experimental results show that the improved IOTA using random function to select the midway walk starting point from i-50λ, to i-75λsubstantially solves the system computational burden problem and greatly reduces the cumulative weight update delay.
With the increasing reach of Industry 4.0, the internet of Things (IoT) and Artificial Intelligence (AI) and many other technologies, have emerged as pivotal components in the era of information technology. Recent pro...
详细信息
ISBN:
(纸本)9798350351491;9798350351484
With the increasing reach of Industry 4.0, the internet of Things (IoT) and Artificial Intelligence (AI) and many other technologies, have emerged as pivotal components in the era of information technology. Recent progress in AI, and its sub-field machine learning (ML), have influenced numerous research domains inside the industry, achieving improvements that were not possible with conventional optimization techniques, notably illustrated in the case of predictive maintenance. A significant component of predictive maintenance is fault detection. The goal of predictive maintenance is to avoid future machine failure and consequent downtime by anticipating faults in machinery. As a result, the aim of this research is to employ ML models for fault identification process. A concrete dataset was employed with real sensors' outputs allowing to make analysis of faults in machines mounted with various types of sensors. Four distinct supervised ML algorithms were applied in our work in which their hyper-parameters were tuned with both Grid Search and Random Search methods. A comparative study between the algorithms' performances was made in order to select the best one with highest metrics percentages. A web-based application was also developed, to monitor data and send alerts when detecting anomalies either via SMS, email or inside the provided web interface.
Passive bearing-crossing localization technology has an important application in the scenario of UAV (Unmanned Aerial Vehicle) target positioning, in which the removal of false intersection points in the process of mu...
详细信息
With the continuous advancement of internettechnology, the transmission and storage of medical images in the network environment are becoming increasingly frequent. Ensuring the security of these image data has becom...
详细信息
Nowadays, the advancement of modern communication systems, along with internet usability, enhances the application of multimedia data in various fields. In this context, security in multimedia data is highly demanding...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
Nowadays, the advancement of modern communication systems, along with internet usability, enhances the application of multimedia data in various fields. In this context, security in multimedia data is highly demanding to prevent unauthorized access, as well as to ensure confidentiality. This paper introduces a new reversible blind imagewatermarking scheme to validate the image authentication and confidentiality for secret information. To address this aim, a spread-spectrum-based message hiding technique is developed. The reduced Lorenz map combined with the sine-cos map is employed here to produce a key-dependent pseudo-random number (PRN), which is directly mapped into the cover image according to the bit pattern of the secret message. On the other hand, the message hiding has been performed in the cover image by decomposing it using a two-level integer wavelet transform (IWT). The robustness of the scheme is further improved by employing Hamming (7, 4) code and a geometric distortion correction module. Several cover images are used to examine the effectiveness of the proposed scheme. The experimental results present that this approach has better or equivalent robustness against common sig-D nal processing distortions and geometric distortions compared to relevant existing schemes.
In the realm of internet communication, memes have emerged as a powerful means of expression, swiftly disseminating emotions and ideas. The ability to classify memes, particularly in languages with regional nuances su...
详细信息
Digital image authentication is a critical process in ensuring the integrity and ownership of digital images, especially in the age of widespread digital manipulation and unauthorized use. In this manuscript, an image...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
Digital image authentication is a critical process in ensuring the integrity and ownership of digital images, especially in the age of widespread digital manipulation and unauthorized use. In this manuscript, an image watermarking scheme has been proposed by combining the Lifting Wavelet Transform (LWT) and the Least Significant Bit (LSB) for image authentication. The goal of the proposed scheme is to achieve robustness against various attacks while maintaining the high-quality visual appearance of the watermarked image. Experimental evaluations are conducted to assess the performance of the proposed hybrid watermarking scheme. Various metrics, including Peak signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Normalized Correlation (NC), are employed to measure the visual quality, robustness, and authentication accuracy of the watermarked image. The results demonstrate the effectiveness of the proposed scheme in achieving high-quality visual appearance, robustness against attacks, and accurate image authentication.
暂无评论