The information Retrieval System Evaluation have carried out through Cranfield-paradigm in which the test collections provide the foundation of the evaluation process. The test collections consist of document corpus, ...
详细信息
Due to the combinatorial nature of graphs they are used easily in pure sciences and social *** dynamical arrangement of vertices and their associated edges make them flexible(like liquid)to attain the shape of any phy...
详细信息
Due to the combinatorial nature of graphs they are used easily in pure sciences and social *** dynamical arrangement of vertices and their associated edges make them flexible(like liquid)to attain the shape of any physical structure or phenomenon *** the field of ICT they are used to reflect distributed component and communication among *** chemistry is another interesting domain of applied mathematics that endeavors to display the structure of compounds that are formed in result of chemical *** area attracts the researchers due to its applications in theoretical and organic *** also inspires the mathematicians due to involvement of mathematical *** or irregular bonding ability of molecules and their formation of chemical compounds can be analyzed using atomic valences(vertex degrees).Pictorial representation of these compounds helps in identifying their properties by computing different graph invariants that is really considered as an application of graph *** paper reflects the work on topological indices such as ev-degree Zagreb index,the first ve-degree Zagrebindex,the first ve-degree Zagrebindex,the second ve-degree Zagreb index,ve-degree Randic index,the ev-degree Randic index,the ve-degree atom-bond connectivity index,the ve-degree geometric-arithmetic index,the ve-degree harmonic index and the ve-degree sum-connectivity index for crystal structural networks namely,bismuth tri-iodide and lead *** this article we have determine the exact values of ve-degree and ev-degree based topological descriptors for crystal networks.
A safe and adequate blood supply is essential for healthcare systems to function effectively. Accurately forecasting blood demand plays a key role in efficient inventory management and resource allocation. Traditional...
详细信息
Network coding is rising as a powerful approach that can grow the throughput of wireless networks. This approach has been the difficulty of numerous studies and has spread new possibilities for Wi-Fi networks. In this...
详细信息
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ...
详细信息
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective purposes, one is reserved to hold the data, and through the implementation of the dynamic difference expansion principle, the other sloughs some parts to the reserved region in responsive to the size of the data to embed. Continuously reseeding and initializing the parameter values of a Linear Congruential Generator (LCG), generate a set of random pixel positions as members of the reserved region. Before data embedding, the region reserved to hold the data as well as the data bits to embed, are then encrypted using AES with respective keys. Encryption keys are randomly generated using a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG), the Fortuna algorithm. Multiplex security nature of using a randomization generator to reserve image region for encryption and encrypting plaintext data before performing steganography still ensures stability in computational complexities better than a logarithmic O(n log n). A visual inspection by evaluators who made 3000 choices to correctly differentiate stego images from its cover-images shows that only 47 choices were correct, 1884 choices were wrong, while 1069 choices were uncertain. An experiment shows an average Embedding Rates (ERs) of 0.00109 bpp and an average PSNR of 72. This concludes, as our integrated steganography and image encryption which implements the dynamic difference expansion principle, outputs encrypted stego mages that can deceive the naked human eyes into identifying them as rather cover-images, its embedding rate is faster (i.e. ER < 0.1), suitably good, and ensures better imperceptibility of cover-image alterations. When comparing these experimental results with existing methods, our proposed model shows significant competitiveness. We even show real-life scenarios on how this
The importance of renewable energy in our everyday lives cannot be overstated, specifically highlighting solar and wind energies as two crucial sustainable power sources. Nevertheless, it is crucial to acknowledge tha...
详细信息
The purpose of this paper is to present a new GAN-ID algorithm to gener-ate interior scene intelligently based on Artificial Intelligence of Things (AIoT). Although great progress has been made when GAN algorithm appl...
详细信息
Fusing medical images is a topic of interest in processing medical *** is achieved to through fusing information from multimodality images for the purpose of increasing the clinical diagnosis *** fusion aims to improv...
详细信息
Fusing medical images is a topic of interest in processing medical *** is achieved to through fusing information from multimodality images for the purpose of increasing the clinical diagnosis *** fusion aims to improve the image quality and preserve the specific *** methods of medical image fusion generally use knowledge in many differentfields such as clinical medicine,computer vision,digital imaging,machine learning,pattern recognition to fuse different medical *** are two main approaches in fusing image,including spatial domain approach and transform domain *** paper proposes a new algorithm to fusion multimodal *** algorithm is based on Entropy optimization and the Sobel *** transform is used to split the input images into components over the low and high frequency ***,two fusion rules are used for obtaining the fusing *** rule,based on the Sobel operator,is used for high frequency *** second rule,based on Entropy optimization by using Particle Swarm Optimization(PSO)algorithm,is used for low frequency *** algorithm is implemented on the images related to central nervous system *** experimental results of the paper show that the proposed algorithm is better than some recent methods in term of brightness level,the contrast,the entropy,the gradient and visual informationfidelity for fusion(VIFF),Feature Mutual information(FMI)indices.
Creating realistic images from textual descriptions is a major challenge in computer vision and natural language processing. Traditional methods often fail to accurately translate text into visual representations, res...
详细信息
In Biomedicine, computer software is applied to the medical image for content analysis by MRI scanning for the program. Preprocessing, removal of noise, processing images in order to detect objects and analysis of the...
详细信息
暂无评论