Microgrids (MGs) serve as central interfaces for distributed generation, predominantly employing voltage source inverters (VSIs). These MGs operate in either autonomous or grid-connected modes, facilitating local powe...
详细信息
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing s...
详细信息
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing superpoint segmentation methods focus only on local geometric structures,resulting in inconsistent spectral features of points within a *** feature inconsistencies degrade the performance of subsequent ***,this study proposes a novel Superpoint Segmentation method that jointly utilizes spatial Geometric and Spectral Information for multispectral point cloud superpoint segmentation(GSI-SS).Specifically,a similarity metric that combines spatial geometry and spectral information is proposed to facilitate the consistency of geometric structures and object attributes within segmented *** the formation of the primary superpoints,an intersuperpoint pointexchange mechanism that maximizes feature consistency within the final superpoints is *** are conducted on two real multispectral point cloud datasets,and the proposed method achieved higher recall,precision,F score,and lower global consistency and feature classification *** experimental results demonstrate the superiority of the proposed GSI-SS over several state-of-the-art methods.
This paper provides an overview of the technical aspects of the application of amateur radio stations in maintaining mobile communication in distress and emergency situations. Ultra-high frequencies (UHF) were selecte...
详细信息
One of the first public key schemes was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman at MIT and first published in 1978. Since then, the RSA scheme has become the most widely accepted and applied publi...
详细信息
This paper presents a square coaxial transmission line that is partially filled with 3-D printing low-cost insulator. The proposed coaxial line is composed of two metal conductors and 3D printing insulator. To reduce ...
详细信息
With the development of integrated circuit (IC) technology, the application scenes of the Internet of Things (IoT) are becoming more and more extensive. The Internet of Things makes it difficult for traditional encryp...
详细信息
Accurate text recognition and detection results for complex action-filled video images are very hard to achieve. To simplify the problem and enhance text detection and recognition capabilities, this work suggests Deep...
详细信息
One of the critical visual components in video game creation is 3D asset prototypes, which also require significant effort. A procedural model using the L-system method for making low-poly buildings can address this i...
详细信息
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t...
详细信息
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image ***,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical *** addition,these numbers may cluster in certain *** hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can ***,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego *** paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data *** AVL tree algorithm provides several advantages for image ***,it ensures balanced tree structures,which leads to efficient data retrieval and insertion ***,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image *** data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel *** green channel serves as the foundation for building a balanced binary ***,the sender identifies the colored cover image and secret *** sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated *** next step is to create a balanced binary tree based on the green *** the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue *** first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret *** embedding the bits i
Hateful behavior on social platforms has recently become a topic of interest for many researchers. Users experience online encounters with instances of hate speech on a daily basis. This paper investigates how using m...
详细信息
暂无评论