Showing 41 - 60 results of 111 for search 'algorithmically random sequence', query time: 0.05s Refine Results
  1. 41

    Self-embedding robust digital watermarking algorithm with perfectly blind detection by Tian-yu YE

    Published 2012-10-01
    “…Those existing robust watermarking algorithms couldn’t achieve perfectly blind detection.A robust watermarking algorithm with perfectly blind detection was proposed by introducing the self-embedding idea into robust watermarking literature.At first,the original image was split into non-overlapping blocks,and each block was transformed by DCT.The feature watermark was derived from judging the numerical relationship between each block’s DC coefficient and average of DC coefficients form all blocks.After encrypted by Logistic chaos sequence,the feature watermark was self-embedded into each block by adjusting two middle or low frequency DCT coefficients.Finally,the watermarked image was obtained after IDCT.The proposed algorithm achieved perfectly blind detection by combining self-embedding the encrypted feature watermark and blindly extracting authentication watermark.Experimental results show that the proposed algorithm has strong robustness to resist various attacks such as smoothing,adding noise,JPEG compression,resampling,cropping and geometric attacks like random row removal,downward shifting and right shifting.…”
    Get full text
    Article
  2. 42

    Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos by Shu-ying Wang, Jian-feng Zhao, Xiao-yan Wang, Li-tao Zhang

    Published 2019-01-01
    “…Then, the 0–1 test analysis is applied to detect random nature of chaotic sequences exhibited by the fractional-order systems. …”
    Get full text
    Article
  3. 43

    Deconvolution Filtering for Nonlinear Stochastic Systems with Randomly Occurring Sensor Delays via Probability-Dependent Method by Yuqiang Luo, Guoliang Wei, Hamid Reza Karimi, Licheng Wang

    Published 2013-01-01
    “…When the time-varying sensor delays occur randomly with a time-varying probability sequence, the proposed gain-scheduled filtering algorithm is very effective. …”
    Get full text
    Article
  4. 44
  5. 45

    Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm by Yong Zeng, Dacheng Liu, Zhou Lei

    Published 2014-01-01
    “…The situation sequence contains a series of complicated and multivariate random trends, which are very sudden, uncertain, and difficult to recognize and describe its principle by traditional algorithms. …”
    Get full text
    Article
  6. 46

    Research on the algorithm for reducing the PAPR of OFDM system based on quantum chaotic mapping by Yingjie MA, Geng ZHAO, Zhanzhen WEI, Zhaobin LI, Lei JU

    Published 2019-01-01
    “…Aiming at the high peak to average power ratio (PAPR) problem of OFDM system,a modified selective mapping algorithm based on quantum loigstic chaotic map was proposed.To solve the problem of fixed point and stable window,the quantum loigstic chaotic maps were used as random phase sequence vectors,which provided a large number signals with fine correlation and random characteristics,easy to produce and regenerate.Matlab simulation results show that the proposed algorithm effectively reduces the PAPR,increases the numbers of candidate signals,cuts down the amount of redundant information transmission,bring down the side band power.The proposed scheme has a broad application prospect in OFDM system.…”
    Get full text
    Article
  7. 47

    Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing by Hua REN, Shaozhang NIU, Ruyong REN, Zhen YUE

    Published 2022-05-01
    “…Aiming at the problems that the existing compressive sensing-based meaningful image encryption algorithms have low visual security of the encrypted images and poor quality of the reconstructed images, a 2-dimensional compressive sensing-based (2DCS) meaningful image encryption algorithm was proposed.Firstly, a chaotic pseudo-random sequence generation method associated with plaintext was designed, and the global random permutation and grayscale transformation operations were used for pre-encryption to improve the decrypted image quality.The generated pre-encrypted image was used as the input for 2DCS, and the secret image was generated after the compression encryption and quantization operations.Secondly, the relationship between the hidden and the modified data was considered, and an adaptive embedding method was adopted to modify the carrier coefficient values to improve the visual security of meaningful encrypted image.Finally, the 2-dimensional projection gradient reconstruction method was adopted to decompress and decrypt to obtain the decrypted image.The experimental results show that, compared with the existing algorithms, the proposed algorithm not only improves the visual security of encrypted image and the quality of reconstructed image, but also can resist noise and cropping attacks.…”
    Get full text
    Article
  8. 48
  9. 49

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…In this paper, a new algorithm for data splitting called EPPA is presented to strengthen the confidentiality of data by two-phase process. …”
    Get full text
    Article
  10. 50

    MIP Models and Hybrid Algorithms for Simultaneous Job Splitting and Scheduling on Unrelated Parallel Machines by Duygu Yilmaz Eroglu, H. Cenk Ozmutlu

    Published 2014-01-01
    “…We developed algorithms that satisfy the adaptation of results of local search into the genetic algorithms with minimum relocation operation of genes’ random key numbers. …”
    Get full text
    Article
  11. 51

    A Numerical Study on the Regularity of d-Primes via Informational Entropy and Visibility Algorithms by B. L. Mayer, L. H. A. Monteiro

    Published 2020-01-01
    “…Then, these sequences are mapped into graphs by employing two visibility algorithms. …”
    Get full text
    Article
  12. 52

    The role of hybrid models in financial decision-making: Forecasting stock prices with advanced algorithms by Xiaoyi Zhu

    Published 2025-03-01
    “…To reduce the complexity of the time series decomposition and clustering methods were employed. Then, the high sequences underwent processing using the optimized random forest algorithm, and the remaining sequences were subjected to processing utilizing optimized bidirectional long short-term memory. …”
    Get full text
    Article
  13. 53

    A Multiuser Detector Based on Artificial Bee Colony Algorithm for DS-UWB Systems by Zhendong Yin, Xiaohui Liu, Zhilu Wu

    Published 2013-01-01
    “…In this paper, an efficient multiuser detector based on a suboptimal code mapping multiuser detector and artificial bee colony algorithm (SCM-ABC-MUD) is proposed and implemented in direct-sequence ultra-wideband (DS-UWB) systems under the additive white Gaussian noise (AWGN) channel. …”
    Get full text
    Article
  14. 54
  15. 55

    Hybrid genetic algorithm to minimize scheduling cost with unequal and job dependent earliness tardiness cost by Prasad Bari, Prasad Karande, Vaidehi Bag

    Published 2023-11-01
    “…The sequence of jobs produced in basic UET and JDET as a chromosome is added to the random population of GA. …”
    Get full text
    Article
  16. 56

    Predictions of Multilevel Linguistic Features to Readability of Hong Kong Primary School Textbooks: A Machine Learning Based Exploration by Zhengye Xu, Yixun Li, Duo Liu

    Published 2024-12-01
    “…Fifteen combinations of linguistic features were trained using Support Vector Machine (SVM) and Random Forest (RF) algorithms. Model performance was evaluated by prediction accuracy and the mean absolute error between predicted and actual readability. …”
    Get full text
    Article
  17. 57
  18. 58

    Solutions to No-Wait Flow Shop Scheduling Problem Using the Flower Pollination Algorithm Based on the Hormone Modulation Mechanism by Chiwen Qu, Yanming Fu, Zhongjun Yi, Jun Tan

    Published 2018-01-01
    “…Random keys are encoded based on an ascending sequence of components to make the flower pollination algorithm (FPA) suitable for the no-wait flow shop scheduling problem. …”
    Get full text
    Article
  19. 59

    High-Accuracy Fault Location Detection in Double-Circuit Transmission Lines Utilizing Extreme Learning Machine Algorithm by Muhammad Hammad Saeed

    Published 2024-09-01
    “…Traditional fault-location methods applied to a double-circuit transmission line are usually implemented according to an abc-domain or a sequence network equivalent circuit that also varies with fault type. …”
    Get full text
    Article
  20. 60

    A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. by Ye Tao, Wenhua Cui, Shanshan Wang, Yayun Wang

    Published 2025-01-01
    “…When scrambling, each pixel changes position with the three pixels before it according to the chaotic sequence. Finally, through many experiments, it is proved that the image encryption algorithm not only greatly improves the encryption and decryption speed, but also improves various indexes. …”
    Get full text
    Article