Modern electric power systems with high levels of penetration of renewable energy sources (RES) often present frequency security problems. The lack of inertia due to the reduced number of synchronous generators in the...
详细信息
Due to its many applications in a variety of domains, including clustering, cloud computing, and power systems, metaheuristic algorithms have attracted a lot of interest from the scholarly community. By using their se...
详细信息
Advances in next-generation sequencing and '-omics' technologies makes it possible to characterize the human gut microbiome. While some of these microorganisms are important regulators of our immune system, mo...
详细信息
作者:
Gabr, MohamedKorayem, YousefChen, Yen-LinYee, Por LipKu, Chin SoonAlexan, Wassim
Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology
Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya
Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman
Department of Computer Science Kampar31900 Malaysia
Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt
New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch...
详细信息
This work studies receding-horizon control of discrete-time switched linear systems subject to polytopic constraints for the continuous states and inputs. The objective is to approximate the optimal receding-horizon c...
详细信息
Dropout (DO) has negative implications for individuals and educational institutions. The field of education data mining (EDM) offers valuable contributions to prevent dropout cases and improve student retention. This ...
详细信息
Streaming graph has been broadly employed across various application domains. It involves updating edges to the graph and then performing analytics on the updated graph. However, existing solutions either suffer from ...
详细信息
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or v...
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or videos), while cryptography scrambles the data into an unreadable format. This paper introduces a new way to hide data using a technique called Perfect Square Quotient Differencing. Instead of embedding data in a straight sequence, the method hides information in two steps within the components of an image pixel (called the quotient and remainder). In the first step, a perfect square quantization technique is applied to the quotient part. In the second step, the Two Least Significant Bit (2LSB) method is used on the remainder part. A new range-table is also introduced to help determine how much data can be hidden in the first step. This two-step approach allows a large amount of data to be hidden (about 3 bits per pixel on average). The method was tested on many animated color images, and its performance was measured using tools like Peak-Signal-to-Noise-Ratio (PSNR), Mean Square Error (MSE), Universal Image Quality Index (UIQI), and Payload Curve. The results show that this method works better than several modern steganography techniques. Additionally, tests were conducted to ensure the method is secure against potential attacks. This new algorithm could be particularly useful for protecting digital documents stored in cloud-based platforms, offering a robust and efficient way to keep data safe.
A wide range of real applications can be modelled as the multiobjective traveling salesman problem (MOTSP), one of typical combinatorial optimization problems. Meta-heuristics can be used to address MOTSP. However, du...
详细信息
The beam spreading is essential for evaluating the higher-order Gaussian beam when it propagates through atmospheric turbulence. In this paper, we investigate the impact of individual atmospheric parameters such as ji...
详细信息
暂无评论