A NOVEL DESIGN OF 17.5 KV HV FEEDTHROUGH FOR ARJUNA 2.0 [PDF]
A NOVEL DESIGN OF 17.5 KV HV FEEDTHROUGH FOR ARJUNA 2.0. A novel design of the 17.5 kV feedthrough for Arjuna 2.0 Cockcroft Walton generator has been proposed.
Adabiah, Suhadah Rabi’atul +5 more
core +2 more sources
A New Torque Control System of Permanent Magnet Synchronous Motor [PDF]
The article describes a new approach to control of permanent magnet synchronous motor drive based on the analysis of the electromechanical transformation. The proposed control system provides quick response and low ripple of the motor torque and flux. To
Batzel +10 more
core +1 more source
Stone Painting Generative Information Hiding Method Through Triangulation and Bezier Curves [PDF]
Unlike natural carrier-based coverless information hiding, non-natural carrier-based coverless information hiding does not attempt to generate or utilize natural carriers to hide secret information, which can fundamentally avoid the discrimination ...
REN Zhiyi, SHAO Liping
doaj +1 more source
Coverless image steganography using morphed face recognition based on convolutional neural network
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Yung-Hui Li +5 more
doaj +1 more source
Steganography is the task of concealing a message within an overt medium such that the presence of the hidden message is barely detectable. Recently, myriads of works have introduced the inchoate techniques of deep learning to the field of steganography.
He Zhu, Dianbo Liu
doaj +1 more source
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources
Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza +2 more
doaj +1 more source
Book cover inventory (in the latest literature) [PDF]
The change in the context of the functioning of literature since 1989 and the transformations contemporary literary life has been subject to due to various reasons have resulted in the need to add a literary science reflection on the latest or not yet ...
Lachman, Magdalena
core +2 more sources
Trust‐Based Missing Link Prediction in Signed Social Networks with Privacy Preservation
With the development of mobile Internet, more and more individuals and institutions tend to express their views on certain things (such as software and music) on social platforms. In some online social network services, users are allowed to label users with similar interests as “trust” to get the information they want and use “distrust” to label users ...
Huaizhen Kou +7 more
wiley +1 more source
Analyzing Satisfaction in Residential Open Space [PDF]
Zugleich gedruckt veröffentlicht im Universitätsverlag der TU Berlin unter der ISBN 978-3-7983-2542-5.This research has been conducted to investigate the most important criteria in the dwelling environment influenced residents’ satisfaction.
Ghazizadeh, Neda, Rückert, Klaus
core +1 more source

