期刊文献+
共找到56篇文章
< 1 2 3 >
每页显示 20 50 100
Robust Damage Detection and Localization Under Complex Environmental Conditions Using Singular Value Decomposition-based Feature Extraction and One-dimensional Convolutional Neural Network
1
作者 Shengkang Zong Sheng Wang +3 位作者 Zhitao Luo Xinkai Wu Hui Zhang Zhonghua Ni 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2023年第3期252-261,共10页
Ultrasonic guided wave is an attractive monitoring technique for large-scale structures but is vulnerable to changes in environmental and operational conditions(EOC),which are inevitable in the normal inspection of ci... Ultrasonic guided wave is an attractive monitoring technique for large-scale structures but is vulnerable to changes in environmental and operational conditions(EOC),which are inevitable in the normal inspection of civil and mechanical structures.This paper thus presents a robust guided wave-based method for damage detection and localization under complex environmental conditions by singular value decomposition-based feature extraction and one-dimensional convolutional neural network(1D-CNN).After singular value decomposition-based feature extraction processing,a temporal robust damage index(TRDI)is extracted,and the effect of EOCs is well removed.Hence,even for the signals with a very large temperature-varying range and low signal-to-noise ratios(SNRs),the final damage detection and localization accuracy retain perfect 100%.Verifications are conducted on two different experimental datasets.The first dataset consists of guided wave signals collected from a thin aluminum plate with artificial noises,and the second is a publicly available experimental dataset of guided wave signals acquired on a composite plate with a temperature ranging from 20℃to 60℃.It is demonstrated that the proposed method can detect and localize the damage accurately and rapidly,showing great potential for application in complex and unknown EOC. 展开更多
关键词 Ultrasonic guided waves singular value decomposition Damage detection and localization Environmental and operational conditions One-dimensional convolutional neural network
下载PDF
Estimation of fracture density and orientation from azimuthal elastic impedance difference through singular value decomposition 被引量:2
2
作者 Lin Li Guang-Zhi Zhang +2 位作者 Jun-Zhou Liu Lei Han Jia-Jia Zhang 《Petroleum Science》 SCIE CAS CSCD 2021年第6期1675-1688,共14页
Accurate estimation of fracture density and orientation is of great significance for seismic characterization of fractured reservoirs.Here,we propose a novel methodology to estimate fracture density and orientation fr... Accurate estimation of fracture density and orientation is of great significance for seismic characterization of fractured reservoirs.Here,we propose a novel methodology to estimate fracture density and orientation from azimuthal elastic impedance(AEI)difference using singular value decomposition(SVD).Based on Hudson's model,we first derive the AEI equation containing fracture density in HTI media,and then obtain basis functions and singular values from the normalized AEI difference utilizing SVD.Analysis shows that the basis function changing with azimuth is related to fracture orientation,fracture density is the linearly weighted sum of singular values,and the first singular value contributes the most to fracture density.Thus,we develop an SVD-based fracture density and orientation inversion approach constrained by smooth prior elastic parameters.Synthetic example shows that fracture density and orientation can be stably estimated,and the correlation coefficient between the true value and the estimated fracture density is above 0.85 even when an S/N ratio of 2.Field data example shows that the estimated fracture orientation is consistent with the interpretation of image log data,and the estimated fracture density reliably indicates fractured gas-bearing reservoir,which could help to guide the exploration and development of fractured reservoirs. 展开更多
关键词 singular value decomposition HTI media Azimuthal elastic impedance inversion Fracture density Fracture orientation
下载PDF
Continuous-Time and Discrete-Time Singular Value Decomposition of an Impulse Response Function
3
作者 Rogelio Luck Yucheng Liu 《Applied Mathematics》 2021年第4期336-347,共12页
This paper proposes the continuous-time singular value decomposition (SVD) for the impulse response function, a special kind of Green’s functions, in order to find a set of singular functions and singular values so t... This paper proposes the continuous-time singular value decomposition (SVD) for the impulse response function, a special kind of Green’s functions, in order to find a set of singular functions and singular values so that the convolutions of such function with the set of singular functions on a specified domain are the solutions to the inhomogeneous differential equations for those singular functions. A numerical example was illustrated to verify the proposed method. Besides the continuous-time SVD, a discrete-time SVD is also presented for the impulse response function, which is modeled using a Toeplitz matrix in the discrete system. The proposed method has broad applications in signal processing, dynamic system analysis, acoustic analysis, thermal analysis, as well as macroeconomic modeling. 展开更多
关键词 singular value decomposition Impulse Response Function Green’s Function Toeplitz Matrix Hankel Matrix
下载PDF
Randomized Generalized Singular Value Decomposition
4
作者 Wei Wei Hui Zhang +1 位作者 Xi Yang Xiaoping Chen 《Communications on Applied Mathematics and Computation》 2021年第1期137-156,共20页
The generalized singular value decomposition(GSVD)of two matrices with the same number of columns is a very useful tool in many practical applications.However,the GSVD may suffer from heavy computational time and memo... The generalized singular value decomposition(GSVD)of two matrices with the same number of columns is a very useful tool in many practical applications.However,the GSVD may suffer from heavy computational time and memory requirement when the scale of the matrices is quite large.In this paper,we use random projections to capture the most of the action of the matrices and propose randomized algorithms for computing a low-rank approximation of the GSVD.Serval error bounds of the approximation are also presented for the proposed randomized algorithms.Finally,some experimental results show that the proposed randomized algorithms can achieve a good accuracy with less computational cost and storage requirement. 展开更多
关键词 Generalized singular value decomposition Randomized algorithm Low-rank approximation Error analysis
下载PDF
A Color Image Encryption Scheme Based on Singular Values and Chaos
5
作者 Adnan Malik Muhammad Ali +2 位作者 Faisal S.Alsubaei Nisar Ahmed Harish Kumar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期965-999,共35页
The security of digital images transmitted via the Internet or other public media is of the utmost importance.Image encryption is a method of keeping an image secure while it travels across a non-secure communication ... The security of digital images transmitted via the Internet or other public media is of the utmost importance.Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities.This study provides an approach to color image encryption that could find practical use in various contexts.The proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and compression-friendly.The unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s performance.Following a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives. 展开更多
关键词 ENCRYPTION image encryption chaos theory color image encryption singular value decomposition compression friendliness
下载PDF
Application of Singular Value Decomposition(SVD)to the Extraction of Gravity Anomalies Associated with Ag-Pb-Zn-W Polymetallic Mineralization in the Bozhushan Ore Field,Southwestern China 被引量:3
6
作者 Lingfen Guo Yongqing Chen Binbin Zhao 《Journal of Earth Science》 SCIE CAS CSCD 2021年第2期310-317,共8页
The Bozhushan Ore Field,located at the western margin of the South China Block,is an important area for Ag-Pb-Zn-W polymetallic mineralization which may be associated with the Late Cretaceous granitic magmaism.In this... The Bozhushan Ore Field,located at the western margin of the South China Block,is an important area for Ag-Pb-Zn-W polymetallic mineralization which may be associated with the Late Cretaceous granitic magmaism.In this paper,the singular value decomposition(SVD)was effectively applied to decompose gravity data at scale of 1:50000 within the Bozhushan Ore Field to extract deep ore-finding information.Two gravity anomaly images displaying different scales of the ore-controlling factors were obtained.(1)The low-pass filtered image may reflect the deeply buried geological structures,hidden intrusions and concealed ore bodies.The negative gravity anomaly may reflect the overall distribution of granite bodies in the Bozhushan Ore Field.One negative gravity anomaly area may correspond to the exposed part of the Baozhushan granitic intrusion and the other corresponds to the concealed part of the granitic intrusion.The granitic intrusions are the main ore-controlling factors in this ore district.(2)The band-pass filtered image depicts the shallow concealed geological structures and geological bodies within this study area.There are two obvious negative gravity anomalies,which may be created by the hidden granites at different depths at both northwestern and southeastern sides of the exposed granitic intrusion.Thus the two negative gravity anomalies are favorable prospecting areas for various type of polymetallic ore deposits at depth.The gravity anomalies extracted by using the SVD exactly reflect the distribution of the ore deposits,structures and intrusions,which will give new insights for further mineral exploration in the study area. 展开更多
关键词 singular value decomposition(SVD) gravity anomaly Ag-Pb-Zn-W polymetallic deposits Bozhushan granitic complex southwestern China
原文传递
Distributed Monitoring of Power System Oscillations Using Multiblock Principal Component Analysis and Higher-order Singular Value Decomposition
7
作者 Arturo Román-Messina Alejandro Castillo-Tapia +3 位作者 David A.Román-García Marcos A.Hernández-Ortega Carlos A.Morales-Rergis Claudia M.Castro-Arvizu 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第4期818-828,共11页
The primary goal in the analysis of hierarchical distributed monitoring and control architectures is to study the spatiotemporal patterns of the interactions between areas or subsystems.In this paper,a novel conceptua... The primary goal in the analysis of hierarchical distributed monitoring and control architectures is to study the spatiotemporal patterns of the interactions between areas or subsystems.In this paper,a novel conceptual framework for distributed monitoring of power system oscillations using multiblock principal component analysis(MB-PCA)and higher-order singular value decomposition(HOSVD)is proposed to understand,characterize,and visualize the global behavior of the power system.The proposed framework can be used to evaluate the influence of a given area or utility on the oscillatory behavior,uncover low-dimensional structures from high-dimensional data,and analyze the effects of heterogeneous data on the modal characteristics and interpretation of power system.The metrics are then investigated to examine the relationships between the dynamic patterns and participation of individual data blocks in the global behavior of the system.Practical application of these techniques is demonstrated by case studies of two systems:a 14-machine test system and a 5449-bus 635-generator equivalent model of a large power system. 展开更多
关键词 Distributed monitoring multiblock principal component analysis(MB-PCA) higher-order singular value decomposition(HOSVD) Tucker decomposition
原文传递
Pulsed Eddy Current Signal Denoising Based on Singular Value Decomposition
8
作者 朱红运 王长龙 +1 位作者 陈海龙 王建斌 《Journal of Shanghai Jiaotong university(Science)》 EI 2016年第1期121-128,共8页
The noise as an undesired phenomenon often appears in the pulsed eddy current testing(PECT)signal, and it is difficult to recognize the character of the testing signal. One of the most common noises presented in the P... The noise as an undesired phenomenon often appears in the pulsed eddy current testing(PECT)signal, and it is difficult to recognize the character of the testing signal. One of the most common noises presented in the PECT signal is the Gaussian noise, since it is caused by the testing environment. A new denoising approach based on singular value decomposition(SVD) is proposed in this paper to reduce the Gaussian noise of PECT signal. The approach first discusses the relationship between signal to noise ratio(SNR) and negentropy of PECT signal. Then the Hankel matrix of PECT signal is constructed for noise reduction, and the matrix is divided into noise subspace and signal subspace by a singular valve threshold. Based on the theory of negentropy, the optimal matrix dimension and threshold are chosen to improve the performance of denoising. The denoised signal Hankel matrix is reconstructed by the singular values of signal subspace, and the denoised signal is finally extracted from this matrix. Experiment is performed to verify the feasibility of the proposed approach, and the results indicate that the proposed approach can reduce the Gaussian noise of PECT signal more effectively compared with other existing approaches. 展开更多
关键词 pulsed eddy current testing(PECT) singular value decomposition(SVD) NEGENTROPY DENOISING
原文传递
An Approximate Linear Solver in Least Square Support Vector Machine Using Randomized Singular Value Decomposition
9
作者 LIU Bing XIANG Hua 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期283-290,共8页
In this paper, we investigate the linear solver in least square support vector machine(LSSVM) for large-scale data regression. The traditional methods using the direct solvers are costly. We know that the linear equat... In this paper, we investigate the linear solver in least square support vector machine(LSSVM) for large-scale data regression. The traditional methods using the direct solvers are costly. We know that the linear equations should be solved repeatedly for choosing appropriate parameters in LSSVM, so the key for speeding up LSSVM is to improve the method of solving the linear equations. We approximate large-scale kernel matrices and get the approximate solution of linear equations by using randomized singular value decomposition(randomized SVD). Some data sets coming from University of California Irvine machine learning repository are used to perform the experiments. We find LSSVM based on randomized SVD is more accurate and less time-consuming in the case of large number of variables than the method based on Nystrom method or Lanczos process. 展开更多
关键词 least square support vector machine Nyström method Lanczos process randomized singular value decomposition
原文传递
Kalman Filtering for Delayed Singular Systems with Multiplicative Noise 被引量:2
10
作者 Xiao Lu Linglong Wang +1 位作者 Haixia Wang Xianghua Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第1期51-58,共8页
Kalman filtering problem for singular systems is dealt with, where the measurements consist of instantaneous measurements and delayed ones, and the plant includes multiplicative noise. By utilizing standard singular v... Kalman filtering problem for singular systems is dealt with, where the measurements consist of instantaneous measurements and delayed ones, and the plant includes multiplicative noise. By utilizing standard singular value decomposition, the restricted equivalent delayed system is presented, and the Kalman filters for the restricted equivalent system are given by using the well-known re-organization of innovation analysis lemma. The optimal Kalman filter for the original system is given based on the above Kalman filter by recursive Riccati equations, and a numerical example is presented to show the validity and efficiency of the proposed approach, where the comparison between the filter and predictor is also given. 展开更多
关键词 Kalman filtering FILTERING ESTIMATION reorganization of innovation analysis singular value decomposition
下载PDF
Coupled Cross-correlation Neural Network Algorithm for Principal Singular Triplet Extraction of a Cross-covariance Matrix 被引量:2
11
作者 Xiaowei Feng Xiangyu Kong Hongguang Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2016年第2期149-156,共8页
This paper proposes a novel coupled neural network learning algorithm to extract the principal singular triplet(PST)of a cross-correlation matrix between two high-dimensional data streams. We firstly introduce a novel... This paper proposes a novel coupled neural network learning algorithm to extract the principal singular triplet(PST)of a cross-correlation matrix between two high-dimensional data streams. We firstly introduce a novel information criterion(NIC),in which the stationary points are singular triplet of the crosscorrelation matrix. Then, based on Newton's method, we obtain a coupled system of ordinary differential equations(ODEs) from the NIC. The ODEs have the same equilibria as the gradient of NIC, however, only the first PST of the system is stable(which is also the desired solution), and all others are(unstable)saddle points. Based on the system, we finally obtain a fast and stable algorithm for PST extraction. The proposed algorithm can solve the speed-stability problem that plagues most noncoupled learning rules. Moreover, the proposed algorithm can also be used to extract multiple PSTs effectively by using sequential method. 展开更多
关键词 singular value decomposition(SVD) coupled algorithm cross-correlation neural network(CNN) speed-stability problem principal singular subspace(PSS) principal singular triplet(PST)
下载PDF
Development of the Decoupled Discreet-Time Jacobian Eigenvalue Approximation for Situational Awareness Utilizing Open PDC 被引量:1
12
作者 Sean D. Kantra Elham B. Makram 《Journal of Power and Energy Engineering》 2016年第9期21-35,共15页
With the increased number of PMUs in the power grid, effective high speed, realtime methods to ascertain relevant data for situational awareness are needed. Several techniques have used data from PMUs in conjunction w... With the increased number of PMUs in the power grid, effective high speed, realtime methods to ascertain relevant data for situational awareness are needed. Several techniques have used data from PMUs in conjunction with state estimation to assess system stability and event detection. However, these techniques require system topology and a large computational time. This paper presents a novel approach that uses real-time PMU data streams without the need of system connectivity or additional state estimation. The new development is based on the approximation of the eigenvalues related to the decoupled discreet-time power flow Jacobian matrix using direct openPDC data in real-time. Results are compared with other methods, such as Prony’s method, which can be too slow to handle big data. The newly developed Discreet-Time Jacobian Eigenvalue Approximation (DDJEA) method not only proves its accuracy, but also shows its effectiveness with minimal computational time: an essential element when considering situational awareness. 展开更多
关键词 SYNCHROPHASOR PMU Open PDC Power Flow Jacobian Decoupled Discreet-Time Jacobian Approximation singular value decomposition (SVD) Prony Analysis
下载PDF
DWT-SVD Based Image Steganography Using Threshold Value Encryption Method
13
作者 Jyoti Khandelwal Vijay Kumar Sharma +1 位作者 Dilbag Singh Atef Zaguia 《Computers, Materials & Continua》 SCIE EI 2022年第8期3299-3312,共14页
Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very ... Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system.This paper presents an image scrambling method that is very useful for grayscale secret images.In this method,the secret image decomposes in three parts based on the pixel’s threshold value.The division of the color image into three parts is very easy based on the color channel but in the grayscale image,it is difficult to implement.The proposed image scrambling method is implemented in image steganography using discrete wavelet transform(DWT),singular value decomposition(SVD),and sorting function.There is no visual difference between the stego image and the cover image.The extracted secret image is also similar to the original secret image.The proposed algorithm outcome is compared with the existed image steganography techniques.The comparative results show the strength of the proposed technique. 展开更多
关键词 Image steganography threshold value SORTING discrete wave transformation singular value decomposition color band division PERMUTATION
下载PDF
A Novel Method to Enhance the Inversion Speed and Precision of the NMR T_(2) Spectrum by the TSVD Based Linearized Bregman Iteration
14
作者 Yiguo Chen Congjun Feng +4 位作者 Yonghong He Zhijun Chen Xiaowei Fan Chao Wang Xinmin Ge 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2451-2463,共13页
The low-field nuclear magnetic resonance(NMR)technique has been used to probe the pore size distribution and the fluid composition in geophysical prospecting and related fields.However,the speed and accuracy of the ex... The low-field nuclear magnetic resonance(NMR)technique has been used to probe the pore size distribution and the fluid composition in geophysical prospecting and related fields.However,the speed and accuracy of the existing numerical inversion methods are still challenging due to the ill-posed nature of the first kind Fredholm integral equation and the contamination of the noises.This paper proposes a novel inversion algorithmto accelerate the convergence and enhance the precision using empirical truncated singular value decompositions(TSVD)and the linearized Bregman iteration.The L1 penalty term is applied to construct the objective function,and then the linearized Bregman iteration is utilized to obtain fast convergence.To reduce the complexity of the computation,empirical TSVD is proposed to compress the kernel matrix and determine the appropriate truncated position.This novel inversion method is validated using numerical simulations.The results indicate that the proposed novel method is significantly efficient and can achieve quick and effective data solutions with low signal-to-noise ratios. 展开更多
关键词 Low field nuclear magnetic resonance linearized bregman iteration truncated singular value decomposition numerical simulations
下载PDF
Effects of surface heating on precipitation over the Tibetan Plateau and its eastern margin
15
作者 MaoShan Li YuChen Liu +4 位作者 Zhao Lv YongHao Jiang Pei Xu YaoMing Ma FangLin Sun 《Research in Cold and Arid Regions》 CSCD 2023年第5期230-238,共9页
The high terrain of the Tibetan Plateau(TP)has a very important impact on the weather and climate of China,East Asia,South Asia,and even the Northern Hemisphere.However,in recent years,the reasons for the decrease in ... The high terrain of the Tibetan Plateau(TP)has a very important impact on the weather and climate of China,East Asia,South Asia,and even the Northern Hemisphere.However,in recent years,the reasons for the decrease in precipitation in the southeastern edge of the plateau have resulted in cutting-edge research regarding the impact of the TP and its surrounding areas on downstream weather and climate.In this study,the spatial and temporal distribution of surface heat flux and precipitation were analyzed from 1998 to 2022,and the possible mechanism of the decrease of precipitation in the eastern edge of the plateau is explored.The main conclusions are as follows:The annual average sensible heat flux in the TP and its east side is positive,with an average of 33.73 W/m^(2).The annual average latent heat flux is positive,with an average of 42.71 W/m^(2).Precipitation has a similar annual average and seasonal distribution,with modest amounts in the northwest and substantial amounts in the southeast.The average annual accumulated precipitation is 670.69 mm.The first mode of the Empirical Orthogonal Function(EOF)shows that sensible heat flux decreases first,then increases,and then finally decreases during 1998–2022.The modes show the opposite trend in middle part of the plateau.The latent heat flux initially decreases,then increases,and finally decreases in the western plateau and near Sichuan Basin.The mode,however,displays the opposite tendency throughout the rest of the region.The precipitation in the north and south sides of the plateau has decreased since 2013,which is consistent with the changing trend of sensible heat flux.In the rest of the region,the change trend is not obvious.The sensible heat of the main body of the plateau and its east side and Sichuan Basin is negatively correlated with precipitation,that is,when sensible heat flux of the main body of the plateau and its east side and Sichuan Basin is more(less),local precipitation is less(more).The latent heat of the main body of the plateau and its east side,Sichuan Basin is positively correlated with precipitation,indicating that when latent heat flux of the main body of the plateau and its east side,Sichuan Basin is more(less),local precipitation is more(less). 展开更多
关键词 The Tibetan Plateau Surface heating PRECIPITATION EOF singular value decomposition(SVD)
下载PDF
HybridWatermarking and Encryption Techniques for Securing Medical Images
16
作者 Amel Ali Alhussan Hanaa A.Abdallah +1 位作者 Sara Alsodairi Abdelhamied A.Ateya 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期403-416,共14页
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Waterma... Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Watermarking.This paper introduces a novel robust algorithm that combines discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD)digital image-watermarking algorithms.The host image is decomposed using a two-dimensional DWT(2D-DWT)to approximate low-frequency sub-bands in the embedding process.Then the sub-band low-high(LH)is decomposed using 2D-DWT to four new sub-bands.The resulting sub-band low-high(LH1)is decomposed using 2D-DWT to four new sub-bands.Two frequency bands,high-high(HH_(2))and high-low(HL_(2)),are transformed by DCT,and then the SVD is applied to the DCT coefficients.The strongest modified singular values(SVs)vary very little for most attacks,which is an important property of SVD watermarking.The two watermark images are encrypted using two layers of encryption,circular and chaotic encryption techniques,to increase security.The first encrypted watermark is embedded in the S component of the DCT components of the HL_(2)coefficients.The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients.The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results. 展开更多
关键词 WATERMARKING discrete wavelet transform discrete cosine transform singular value decomposition circular encryption chaotic encryption
下载PDF
A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region
17
作者 Kali Gurkahraman Rukiye Karakis Hidayet Takci 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期55-77,共23页
This study aimed to deal with three challenges:robustness,imperceptibility,and capacity in the image watermarking field.To reach a high capacity,a novel similarity-based edge detection algorithm was developed that fin... This study aimed to deal with three challenges:robustness,imperceptibility,and capacity in the image watermarking field.To reach a high capacity,a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques.The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm.To ensure robustness and imperceptibility,watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition.In the watermarking stage,the watermark image was weighted by the adaptive scaling factor calculated by the standard deviation of the similarity image.According to the results,the proposed edge-based color image watermarking technique has achieved high payload capacity,imperceptibility,and robustness to all attacks.In addition,the highest performance values were obtained against rotation attack,to which sufficient robustness has not been reached in the related studies. 展开更多
关键词 Image watermarking edge detection discrete wavelet transform singular value decomposition adaptive scaling factor
下载PDF
Effective and Efficient Video Compression by the Deep Learning Techniques
18
作者 Karthick Panneerselvam K.Mahesh +1 位作者 V.L.Helen Josephine A.Ranjith Kumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1047-1061,共15页
Deep learning has reached many successes in Video Processing.Video has become a growing important part of our daily digital interactions.The advancement of better resolution content and the large volume offers serious... Deep learning has reached many successes in Video Processing.Video has become a growing important part of our daily digital interactions.The advancement of better resolution content and the large volume offers serious challenges to the goal of receiving,distributing,compressing and revealing highquality video content.In this paper we propose a novel Effective and Efficient video compression by the Deep Learning framework based on the flask,which creatively combines the Deep Learning Techniques on Convolutional Neural Networks(CNN)and Generative Adversarial Networks(GAN).The video compression method involves the layers are divided into different groups for data processing,using CNN to remove the duplicate frames,repeating the single image instead of the duplicate images by recognizing and detecting minute changes using GAN and recorded with Long Short-Term Memory(LSTM).Instead of the complete image,the small changes generated using GAN are substituted,which helps with frame-level compression.Pixel wise comparison is performed using K-nearest Neighbours(KNN)over the frame,clustered with K-means and Singular Value Decomposition(SVD)is applied for every frame in the video for all three colour channels[Red,Green,Blue]to decrease the dimension of the utility matrix[R,G,B]by extracting its latent factors.Video frames are packed with parameters with the aid of a codec and converted to video format and the results are compared with the original video.Repeated experiments on several videos with different sizes,duration,Frames per second(FPS),and quality results demonstrated a significant resampling rate.On normal,the outcome delivered had around a 10%deviation in quality and over half in size when contrasted,and the original video. 展开更多
关键词 Convolutional neural networks(CNN) generative adversarial network(GAN) singular value decomposition(SVD) K-nearest neighbours(KNN) stochastic gradient descent(SGD) long short-term memory(LSTM)
下载PDF
A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net
19
作者 P.Shanmuga Prabha S.Magesh Kumar 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3101-3119,共19页
Today,securing devices connected to the internet is challenging as security threats are generated through various sources.The protection of cyber-physical systems from external attacks is a primary task.The presented ... Today,securing devices connected to the internet is challenging as security threats are generated through various sources.The protection of cyber-physical systems from external attacks is a primary task.The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters.The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis(MEDA)through Principle Component Analysis(PCA)and Singular Value Decompo-sition(SVD)for the extraction of unique parameters.The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network(R2CNN)and Gradient Boost Regression(GBR)to identify the maximum correlation.Novel Late Fusion Aggregation enabled with Cyber-Net(LFAEC)is the robust derived algorithm.The quantitative analysis uses predicted threat points with actual threat variables from which mean and difference vectors areevaluated.The performance of the presented system is assessed against the parameters such as Accuracy,Precision,Recall,and F1 Score.The proposed method outperformed by 98% to 100% in all quality measures compared to existing methods. 展开更多
关键词 External attacks cyber-physical systems principle component analysis singular value decomposition recurrent 2 convolutional neural network gradient boost regression
下载PDF
A Hybrid Air Quality Prediction Model Based on Empirical Mode Decomposition
20
作者 Yuxuan Cao Difei Zhang +2 位作者 Shaoqi Ding Weiyi Zhong Chao Yan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第1期99-111,共13页
Air pollution is a severe environmental problem in urban areas.Accurate air quality prediction can help governments and individuals make proper decisions to cope with potential air pollution.As a classic time series f... Air pollution is a severe environmental problem in urban areas.Accurate air quality prediction can help governments and individuals make proper decisions to cope with potential air pollution.As a classic time series forecasting model,the AutoRegressive Integrated Moving Average(ARIMA)has been widely adopted in air quality prediction.However,because of the volatility of air quality and the lack of additional context information,i.e.,the spatial relationships among monitor stations,traditional ARIMA models suffer from unstable prediction performance.Though some deep networks can achieve higher accuracy,a mass of training data,heavy computing,and time cost are required.In this paper,we propose a hybrid model to simultaneously predict seven air pollution indicators from multiple monitoring stations.The proposed model consists of three components:(1)an extended ARIMA to predict matrix series of multiple air quality indicators from several adjacent monitoring stations;(2)the Empirical Mode Decomposition(EMD)to decompose the air quality time series data into multiple smooth sub-series;and(3)the truncated Singular Value Decomposition(SvD)to compress and denoise the expanded matrix.Experimental results on the public dataset show that our proposed model outperforms the state-of-art air quality forecasting models in both accuracy and time cost. 展开更多
关键词 air quality prediction Empirical Mode decomposition(EMD) singular value decomposition(SVD) AutoRegressive Integrated Moving Average(ARIMA)
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部