Coverless steganography based on motion analysis of video
Y Tan, J Qin, X Xiang, C Zhang… - Security and …, 2021 - Wiley Online Library
With the rapid development of interactive multimedia services and camera sensor networks,
the number of network videos is exploding, which has formed a natural carrier library for …
the number of network videos is exploding, which has formed a natural carrier library for …
Secured osprey-based energy efficient routing and congestion control in WSN
RM Bhavadharini, B Surendiran - Sustainable Computing: Informatics and …, 2024 - Elsevier
An adaptive metaheuristic optimization-based QoS-aware, Energy-balancing, Secure
Routing Protocol (AQoS-ESRP) is proposed in this article. The network is modelled as a …
Routing Protocol (AQoS-ESRP) is proposed in this article. The network is modelled as a …
[HTML][HTML] ADCC: An effective adaptive duty cycle control scheme for real time big data in Green IoT
J Bai, Z Zeng, KM Abualnaja, NN Xiong - Alexandria Engineering Journal, 2022 - Elsevier
Currently, large number of devices have been connected to the Internet of Things (IoT).
Ubiquitous IoT devices encounter emergencies and generate much data which may lead to …
Ubiquitous IoT devices encounter emergencies and generate much data which may lead to …
The PSL MAC Protocol for Accumulated Data Processing in the Energy‐Harvesting Wireless Sensor Network
R Wang, W Li, F Gao, T Jiao - Wireless Communications and …, 2022 - Wiley Online Library
In the energy‐harvesting wireless sensor network (EH‐WSN), the actual energy‐harvesting
rate of each node varies due to the difference in node deployment or a sudden change in …
rate of each node varies due to the difference in node deployment or a sudden change in …
[PDF][PDF] A robust text coverless information hiding based on multi-index method
L Xiang, J Qin, X Xiang, Y Tan… - Intelligent Automation & …, 2021 - cdn.techscience.cn
Recently, researchers have shown that coverless information hiding technology can
effectively resist the existing steganalysis tools. However, the robustness of existing …
effectively resist the existing steganalysis tools. However, the robustness of existing …
[PDF][PDF] Ecological security evaluation algorithm for resource-exhausted cities based on the PSR model
X Li, Z Xu, Y Fu, Q Jin, Y Zhao… - CMC-COMPUTERS …, 2021 - cdn.techscience.cn
Today, resource depletion threatens a number of resource-based cities in China. The
ecological security problem caused by the long-term exploitation of natural resources is a …
ecological security problem caused by the long-term exploitation of natural resources is a …
[PDF][PDF] Main Factor Selection Algorithm and Stability Analysis of Regional FDI Statistics.
J Huang, B Zhou, H Huang, D Qing… - Intelligent Automation & …, 2021 - cdn.techscience.cn
There are various influencing factors in regional FDI (foreign direct investment) and it is
difficult to identify the main influencing factors. For this reason, a main factor selection …
difficult to identify the main influencing factors. For this reason, a main factor selection …
[PDF][PDF] An adaptive lasso grey model for regional fdi statistics prediction
J Huang, B Zhou, H Huang, J Liu… - Cmc-Computers & …, 2021 - cdn.techscience.cn
To overcome the deficiency of traditional mathematical statistics methods, an adaptive Lasso
grey model algorithm for regional FDI (foreign direct investment) prediction is proposed in …
grey model algorithm for regional FDI (foreign direct investment) prediction is proposed in …
[PDF][PDF] Transmission control under multi-service disciplines in wireless sensor networks
C Gong, D Xie, C Guo… - Computers, Materials & …, 2021 - cdn.techscience.cn
The wireless sensor network (WSN), as the terminal data acquisition system of the 5G
network, has attracted attention due to advantages such as low cost and easy deployment …
network, has attracted attention due to advantages such as low cost and easy deployment …