Results 61 to 70 of about 979 (187)
Heat Transfer Calculations in Barrel Cover of 35 mm Naval Armament System Gun [PDF]
This paper presents the results of numerical simulations of non-stationary heat transfer in a 35 mm anti-air gun barrel cover made of composite materials. The cover protects the gun against weather conditions, including sea water effects, and serves as a
Zbigniew LECIEJEWSKI +5 more
doaj +1 more source
Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao +3 more
core +2 more sources
This paper proposes a reinforcement learning–based framework for robust modulation classification and resource management in non‐orthogonal multiple access (NOMA) systems. By integrating Q‐learning, deep reinforcement learning, and proximal policy optimisation, the approach enhances spectral efficiency, mitigates interference, and improves ...
Mohammed M. Alammar +3 more
wiley +1 more source
Text coverless information hiding method based on synonyms expansion and label delivery mechanism
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Zhen ZHANG +5 more
doaj +2 more sources
Semiconductor projectile impact detector [PDF]
A semiconductor projectile impact detector is described for use in determining micrometeorite presence, as well as its flux and energy comprising a photovoltaic cell which generates a voltage according to the light and heat emitted by the micrometeorites
Shriver, E. L.
core +1 more source
Coverless Steganography for Digital Images Based on a Generative Model [PDF]
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin +3 more
core +2 more sources
ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley +1 more source
From the History of a Book to a "History of the Book" [PDF]
English and American Literature and ...
Price, Leah
core +1 more source
An Improved Near‐Reversible Technique With Residual Networks
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley +1 more source
A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image
With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a
Lina Yang, Haiyu Deng, Xiaocui Dang
doaj +1 more source

