Search
Now showing items 51-60 of 394
Image Steganography: A Review of the Recent Advances
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes. Deep learning technology, ...
Comprehensive review of cybercrime detection techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ...
Ultra-Low Energy CNFET-Based Ternary Combinational Circuits Designs
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The embedded systems, IoT (Internet of Things) devices, and portable electronic devices spread very quickly recently. Most of them depend on batteries to operate. The target of this work is to decrease energy consumption ...
Influence of codebook patterns on writer recognition: An experimental study
(
Blackwell Publishing Ltd
, 2021 , Article)
Codebook-based writer characterization is an effective technique that has been investigated in a number of recent studies on identification and verification of writers. These methods divide a set of writing samples into ...
DeepWTPCA-L1: A New Deep Face Recognition Model Based on WTPCA-L1 Norm Features
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In this paper, we propose a robust face recognition model called DeepWTPCA-L1 using WTPCA-L1 features and a CNN-LSTM architecture. First, WTPCA-L1 algorithm, composed of Three-level decomposition of discrete wavelet transform ...
Historical documents dating using multispectral imaging and ordinal classification
(
Elsevier Masson s.r.l.
, 2020 , Article)
The estimation of the age of undated old manuscripts is one of the most challenging and controversial tasks in the field of historical document analysis. Several dating methods have been proposed, but most of them either ...
A comprehensive overview of feature representation for biometric recognition
(
Springer
, 2020 , Article)
The performance of any biometric recognition system heavily dependents on finding a good and suitable feature representation space where observations from different classes are well separated. Unfortunately, finding this ...
Increase the Efficiency of IoT Devices by Using the Wireless Power Transmission in the Industrial Revolution 4.0
(
International Association of Online Engineering
, 2021 , Article)
Today's world is evolving toward creating a smart house where a multitude of Internet of Things (IoT) devices and sensors are interacting to deliver plenty of useful information. Essential to the implementation of this IoT ...
COVID-19 lesion segmentation using lung CT scan images: Comparative study based on active contour models
(
MDPI
, 2021 , Article)
Pneumonia is a lung infection that threatens all age groups. In this paper, we use CT scans to investigate the effectiveness of active contour models (ACMs) for segmentation of pneumonia caused by the Coronavirus disease ...
Applications, databases and open computer vision research from drone videos and images: a survey
(
Springer Science and Business Media B.V.
, 2021 , Article)
Analyzing videos and images captured by unmanned aerial vehicles or aerial drones is an emerging application attracting significant attention from researchers in various areas of computer vision. Currently, the major ...