Several different digital watermarking methods have been researched and proposed in the last ten years. However, most of the proposed methods focused on a single purpose. Recently, some multipurpose watermarking metho...
详细信息
This study investigates the effects of the spatial harmonics of magneto-motive force that appear in the air-gap of aluminum-cage induction motors, proposing some techniques for their mitigation. With respect to previo...
详细信息
This study investigates the effects of the spatial harmonics of magneto-motive force that appear in the air-gap of aluminum-cage induction motors, proposing some techniques for their mitigation. With respect to previous researches, special magnetic wedges to be mounted in the stator opening regions of semi-closed slots of existing motors are proposed, together with a special winding layout having a very low magnetomotive force harmonic content. Both 2D- and 3D-FEM numerical simulations have been carried out to quantify the problems and to understand the potential benefits of inserting the stator wedges. At the end, the mechanical feasibility of the proposed wedges is considered together with some attempts at implementation.
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte...
详细信息
ISBN:
(数字)9798350394962
ISBN:
(纸本)9798350394979
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for content owners and service providers. The Paper describes a secure (tampering-resistant) method for watermarking images for protection and authentication and digital media like audio, video, and multimedia data, and a combination of singular value decomposition (SVD) and Discrete wavelet transform (DWT) for insertion watermark by MATLAB to increase accuracy, simplicity, and flexibility Readability, secure robustness, and imperceptibility the visibility of the image. The proposed algorithm consists of three main steps: Firstly, we decomposed the original image into four sub-bands and the original watermark. Secondly, embed the watermark in the LL sub-band by replacing the singular value for the watermark. Finally, embed a watermark in the other three sub-bands by adding LL values for a watermark in each sub-band in the original image.
暂无评论