首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
无线电   1篇
一般工业技术   1篇
自动化技术   1篇
  2022年   1篇
  2021年   1篇
  2018年   1篇
排序方式: 共有3条查询结果,搜索用时 93 毫秒
1
1.
Wireless Personal Communications - The use of computer-assisted analysis to improve image interpretation has been a long-standing challenge in the medical imaging industry. In terms of image...  相似文献   
2.
ABSTRACT

A trigonometric layerwise shear deformation theory is developed for the flexural analysis of laminated plates. The present theory achieves in-plane displacement continuity, transverse shear stress continuity, and traction-free boundary condition. Hence, botheration of shear correction coefficient is neglected. The governing differential equation and boundary conditions are obtained from the principle of virtual work. Although the present analytical method is bounded to a corner supported boundary condition, it neglects the numerical and computational error. Like first-order shear deformation theory, the present theory possesses five numbers of unknowns. Several numerical predictions are carried out and results are compared with those of other existing numerical approaches.  相似文献   
3.

Nowadays secure medical image watermarking had become a stringent task in telemedicine. This paper presents a novel medical image watermarking method by fuzzy based Region of Interest (ROI) selection and wavelet transformation approach to embed encrypted watermark. First, the source image will undergo fuzzification to determine the critical points through central and final intensity along the radial line for selecting region of interest (ROI). Second, watermark image is altered to time-frequency domain through wavelet decomposition where the sub-bands are swapped based on the magnitude value obtained through logistic mapping. In the each sub-band all the pixels get swapped, results in fully encrypted image which guarantees the watermark to a secure, reliable and an unbreakable form. In order to provide more robustness to watermark image, singular values are obtained for encrypted watermark image and key component is calculated for avoiding false positive error. Singular values of the source and watermark image are modified through key component. Experimental results reveal that the proposed algorithm attains high robustness and improved security to the watermarked image against various kinds of attacks.

  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号