Results 61 to 70 of about 979 (187)

Heat Transfer Calculations in Barrel Cover of 35 mm Naval Armament System Gun [PDF]

open access: yesProblemy Mechatroniki, 2018
This paper presents the results of numerical simulations of non-stationary heat transfer in a 35 mm anti-air gun barrel cover made of composite materials. The cover protects the gun against weather conditions, including sea water effects, and serves as a
Zbigniew LECIEJEWSKI   +5 more
doaj   +1 more source

Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]

open access: yes, 2018
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao   +3 more
core   +2 more sources

Reinforcement Learning for Robust Modulation Classification in Non‐Orthogonal Multiple Access (NOMA) Systems

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a reinforcement learning–based framework for robust modulation classification and resource management in non‐orthogonal multiple access (NOMA) systems. By integrating Q‐learning, deep reinforcement learning, and proximal policy optimisation, the approach enhances spectral efficiency, mitigates interference, and improves ...
Mohammed M. Alammar   +3 more
wiley   +1 more source

Text coverless information hiding method based on synonyms expansion and label delivery mechanism

open access: yesTongxin xuebao, 2021
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Zhen ZHANG   +5 more
doaj   +2 more sources

Semiconductor projectile impact detector [PDF]

open access: yes, 1977
A semiconductor projectile impact detector is described for use in determining micrometeorite presence, as well as its flux and energy comprising a photovoltaic cell which generates a voltage according to the light and heat emitted by the micrometeorites
Shriver, E. L.
core   +1 more source

Coverless Steganography for Digital Images Based on a Generative Model [PDF]

open access: yes, 2018
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin   +3 more
core   +2 more sources

ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley   +1 more source

From the History of a Book to a "History of the Book" [PDF]

open access: yes, 2009
English and American Literature and ...
Price, Leah
core   +1 more source

An Improved Near‐Reversible Technique With Residual Networks

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley   +1 more source

A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image

open access: yesIEEE Access, 2020
With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a
Lina Yang, Haiyu Deng, Xiaocui Dang
doaj   +1 more source

Home - About - Disclaimer - Privacy