Arabic script is exhibited in a cursive style, which is a departure from the norm in many common languages, and the shapes of letters are contingent on their positions within words. The form of the first letter is inf...
详细信息
In this paper, the Pose Invariant Identity Recognition (PIIR) technique is proposed. It measures face resemblance using facial landmarks, which are further vigorous to pose disparity. The proposed technique utilizes t...
详细信息
The country's economy relies heavily on agriculture, and the health of the crops is essential to its success. Crop diseases that go undetected can cost the agriculture industry. Thus early detection and identifica...
详细信息
Due to the complexity and urgency of information exchange in modern companies, optimizing communication protocols in the workplace is essential. Using methods from machine learning, this research takes a fresh tack to...
详细信息
These days, a lot of students struggle in how to choose the career. As they progress through their studies, students must recognize their abilities and assess their areas of interest to determine the most appropriate ...
详细信息
Social media platforms such as Twitter, Facebook, and Instagram are vast repositories of trending global news. They generate an enormous amount of data, offering a valuable resource for both academic researchers and I...
详细信息
This work is an effort towards building Neural Speech Recognizers system for Quranic recitations that can be effectively used by anyone regardless of their gender and age. Despite having a lot of recitations available...
详细信息
The building extraction of the footprint from the satellite imagination has been a research problem that needs to be solved efficiently. The hybrid semantic segmentation framework is used to increase the footprint ext...
详细信息
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase t...
详细信息
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase the protection of *** resilience and imperceptibility are improved by choosing an appropriate embedding *** paper gives a novel system to immerse the secret information in different videos with different *** audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image.A hidden message is first included in the audio from the multimedia file;using LSB *** Stego-video is created in the second stage by merging the authorized user’s face into the frame of the video;by using PVD ***-audio is linked again with the stego-video in the third *** incorporated perspective techniques(LSB-SS and PVD-SS algorithms)with more significant data immersing capacity,good robustness and imperceptibility are proposed in this research *** spread spectrum approach is used to increase the complexity of secret data *** different video files are tested with different voice files with the results such as PSNR,SSIM,RMSE and MSE as 52.3,0.9963,0.0024 and 0.0000059,respectively.
Numerous morphological and histological characteristics of brain tumors make diagnosis and treatment very challenging. Traditional diagnosis methods often depend on the analysis of medical images, which can lead to un...
详细信息
暂无评论