Results 61 to 70 of about 83,553 (194)
Digital Image Watermarking Techniques: A Review
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj +1 more source
‘Steganalysis’ is one of the challenging and attractive interests for the researchers with the development of information hiding techniques. It is the procedure to detect the hidden information from the stego created by known steganographic algorithm. In this paper, a novel feature based image steganalysis technique is proposed.
Indradip Banerjee +2 more
openaire +1 more source
Abstract Lynch syndrome (LS) is the most common hereditary colorectal cancer syndrome, caused by a germline pathogenic variant in one of the mismatch repair (MMR) genes. Among these, MSH6‐associated LS represents a distinct subtype with unique molecular and clinical characteristics.
Salwa Ben Yahia +4 more
wiley +1 more source
Interplay Between Green Investment and Market Price Premia in Global Shipping
ABSTRACT Existing research emphasises that the driver of green investment is its future profitability. This paper shows that other investors' decisions also influence green investment. We take the example of scrubber installation in shipping, which is optional by regulation but has an established market for trading its underlying asset.
Yao Shi +4 more
wiley +1 more source
The power spectrum estimator based on the discrete wavelet transform (DWT) for 3-dimensional samples has been studied. The DWT estimator for multi-dimensional samples provides two types of spectra with respect to diagonal and off-diagonal modes, which ...
Baugh C. M. +9 more
core +1 more source
ABSTRACT Objective The real‐world evidence on the association between glucagon‐like peptide‐1 receptor agonists (GLP‐1RAs) and cancer risk remains limited and mixed. Methods In 2013–2020 national Medicare claims data, we included cancer‐naïve patients with type 2 diabetes (T2D). We identified those who initiated GLP‐1 RA, sodium‐glucose cotransporter 2
Ying Lu +13 more
wiley +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Change Detection Algorithm Based on Discrete Wavelet Transforms and Neighborhood Fuzzy C-Means [PDF]
A new algorithm on Discrete Wavelet Transform (DWT) and neighborhood FCM is proposed to detect change area from remote sensing image. First, the subtraction and ratio image are obtained by the subtraction and ratio method from the two registered remote ...
doaj +1 more source
Pengujian Karakteristik Perpindahan Panas Dan Faktor Gesekan Pada Penukar Kalor Pipa Konsentrik Saluran Persegi dengan Straight Delta Winglet Twisted Tape (S-DWT) Insert Dan Oblique Delta Winglet Twisted Tape (O-DWT) Insert [PDF]
Penelitian ini dilakukan untuk menguji karakteristik perpindahan panas dan faktor gesekan pada penukar kalor pipa konsentrik saluran persegi dengan penambahan straight delta winglet twisted tape (S-DWT) dan oblique delta winglet ...
Haitami, Muhammad Naofal
core
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source

