The use of the Hilbert transform for the analysis of periodically non-stationary random signals (PNRSs), whose carrier harmonics are modulated by jointly stationary high-frequency random processes is discussed. A repr...
详细信息
It’s It’s been so crucial lately to emphasize data security applying as the world depends on data exchange extensively almost in all domains. Steganography is one of the main techniques used to ensure information se...
It’s It’s been so crucial lately to emphasize data security applying as the world depends on data exchange extensively almost in all domains. Steganography is one of the main techniques used to ensure information security in storage and during communication. We accomplish this novel technique by using two main layers. In the first layer, the secret message is compressed using Gzip or encrypted using Advanced Encryption Standard (AES). In the next layer, the binary representation of the secret message is embedded into vertices of x, y, and z-coordinates of the 3D object using the Gray code sequence, Recamán’s sequence, and Lucas sequence. This binary representation of secret message is embedded using the Least Significant Bit (LSB) technique according to the value of the used sequence. Different performance measurements are computed and evaluated to ensure that the 3D object quality remains preserved such as Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), embedding rate (ER), Normalized Hausdorff Distance (NHD) and maximum embedding capacity. The proposed scheme is compared with its counterparts in the literature. Outstanding numerical results are achieved, showing the superiority of the proposed schemes in the terms of performance, capacity, and security.
In this paper, a code-domain nonorthogonal multiple access (NOMA) technique based on an algebraic design is studied. We propose an improved low-density spreading (LDS) sequence design based on projective geometry. In ...
详细信息
Complex networks, neuroscience, and other applications have shown examples of multi-agent adaptive systems that must follow (over possibly short times) reference dynamics that are neither Hurwitz nor neutrally stable....
详细信息
Light with an orbital angular momentum can strongly modify optical transition selection rules when beam size is reduced to subwavelength scale. We demonstrated a method for focusing orbital angular momentum beams belo...
详细信息
ISBN:
(数字)9781957171050
ISBN:
(纸本)9781665466660
Light with an orbital angular momentum can strongly modify optical transition selection rules when beam size is reduced to subwavelength scale. We demonstrated a method for focusing orbital angular momentum beams below the diffraction limit.
Decision-making individuals are typically either an imitator, who mimics the action of the most successful individual(s), a conformist (or coordinating individual), who chooses an action if enough others have done so,...
详细信息
In human societies, people often incorporate fairness in their decisions and treat reciprocally by being kind to those who act kindly. They evaluate the kindness of others' actions not only by monitoring the outco...
详细信息
We develop a connection between tripartite information I 3 , quantum secret sharing protocols and multi-unitaries. This leads to a general framework of constructing ((2, 3)) threshold schemes in arbitrary dimension. A...
We develop a connection between tripartite information I 3 , quantum secret sharing protocols and multi-unitaries. This leads to a general framework of constructing ((2, 3)) threshold schemes in arbitrary dimension. As an application, we propose a class of random codes generated by Haar-distributed random unitaries, in which all states have bounded tripartite information with high probability. Moreover, using the I 3 criteria for imperfect sharing schemes, we discover examples of VIP secret sharing schemes.
This article presents a study on the effectiveness of electrocoagulation (EC) for the removal of azo dyes from wastewater. The analysis was performed using a combination of statistical methods, including density estim...
详细信息
This article presents a study on the effectiveness of electrocoagulation (EC) for the removal of azo dyes from wastewater. The analysis was performed using a combination of statistical methods, including density estimation, correlation analysis, and deep learning for electrocoagulation performance prediction. The results showed that electrocoagulation was able to effectively remove azo dyes from the wastewater, considering the energy consumption and the mass of flocs being important factors in the process. Deep Learning (DL) is used to build our predictive model using the datasets collected during the experimentation stage. Overall, the findings suggest that electrocoagulation is a promising technique for the treatment of wastewater containing azo dyes, and that the use of statistical and machine learning methods can aid in the optimization of the process.
This paper proposed non-contact monitoring by classifying breathing patterns using a frequency-modulated continuous wave (FMCW) radar sensor. First, the data were from the subject to conducting breathing pattern: norm...
This paper proposed non-contact monitoring by classifying breathing patterns using a frequency-modulated continuous wave (FMCW) radar sensor. First, the data were from the subject to conducting breathing pattern: normal, quick, hold, deep, deep quick. Second, we extract the breath wave patterns by employing several block preprocessing and extracting its temporal information that was not investigated by our previous work. Then, to distinguish those five breath wave conditions, the designated Transformer architecture is proposed. Finally, we compared our previous work and demonstrated that our model could enhance accuracy and attained 98.6% of F1-Scores.
暂无评论