Results 61 to 70 of about 84,160 (216)

Dwt Based Image Steganalysis

open access: yes, 2014
‘Steganalysis’ is one of the challenging and attractive interests for the researchers with the development of information hiding techniques. It is the procedure to detect the hidden information from the stego created by known steganographic algorithm. In this paper, a novel feature based image steganalysis technique is proposed.
Indradip Banerjee   +2 more
openaire   +1 more source

Fault Detection and Classification in Five‐Level Reduced Device Count Multilevel Inverter Using Fuzzy Logic System

open access: yesEnergy Science &Engineering, EarlyView.
A fuzzy logic–based diagnostic framework for a reduced device count multilevel inverter to accurately detect and classify open‐circuit faults. ABSTRACT The reliable performance of multilevel inverters (MLIs) is critical to the advancement of power electronic systems used in renewable energy conversion, microgrid operation, and electric vehicle ...
Niraj Kumar Dewangan   +4 more
wiley   +1 more source

Digital Image Watermarking Techniques: A Review

open access: yesInformation, 2020
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic

open access: yes, 2010
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying.
Hsieh, Ming-Shing
core   +3 more sources

A multilevel perspective on MSH6‐associated Lynch syndrome: Integrating molecular, biological, and clinical insights

open access: yesInternational Journal of Cancer, EarlyView.
Abstract Lynch syndrome (LS) is the most common hereditary colorectal cancer syndrome, caused by a germline pathogenic variant in one of the mismatch repair (MMR) genes. Among these, MSH6‐associated LS represents a distinct subtype with unique molecular and clinical characteristics.
Salwa Ben Yahia   +4 more
wiley   +1 more source

Interplay Between Green Investment and Market Price Premia in Global Shipping

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT Existing research emphasises that the driver of green investment is its future profitability. This paper shows that other investors' decisions also influence green investment. We take the example of scrubber installation in shipping, which is optional by regulation but has an established market for trading its underlying asset.
Yao Shi   +4 more
wiley   +1 more source

It\^o vs Stratonovich in the presence of absorbing states

open access: yes, 2019
It is widely assumed that there exists a simple transformation from the It\^o interpretation to the one by Stratonovich and back for any stochastic differential equation of applied interest. While this transformation exists under suitable conditions, and
Correales, Álvaro, Escudero, Carlos
core   +1 more source

Association of Glucagon‐Like Peptide‐1 Receptor Agonists With Cancer Risk in Older Adults With Type 2 Diabetes

open access: yesObesity, EarlyView.
ABSTRACT Objective The real‐world evidence on the association between glucagon‐like peptide‐1 receptor agonists (GLP‐1RAs) and cancer risk remains limited and mixed. Methods In 2013–2020 national Medicare claims data, we included cancer‐naïve patients with type 2 diabetes (T2D). We identified those who initiated GLP‐1 RA, sodium‐glucose cotransporter 2
Ying Lu   +13 more
wiley   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Change Detection Algorithm Based on Discrete Wavelet Transforms and Neighborhood Fuzzy C-Means [PDF]

open access: yesXibei Gongye Daxue Xuebao, 2018
A new algorithm on Discrete Wavelet Transform (DWT) and neighborhood FCM is proposed to detect change area from remote sensing image. First, the subtraction and ratio image are obtained by the subtraction and ratio method from the two registered remote ...

doaj   +1 more source

Home - About - Disclaimer - Privacy