期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Randomization Strategies in Image Steganography Techniques:A Review
1
作者 AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan 《Computers, Materials & Continua》 SCIE EI 2024年第8期3139-3171,共33页
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ... Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography. 展开更多
关键词 Information hiding image steganography randomized embedding techniques payload capacity IMPERCEPTIBILITY
下载PDF
Construction of well logging knowledge graph and intelligent identification method of hydrocarbon-bearing formation 被引量:1
2
作者 LIU Guoqiang GONG Renbin +4 位作者 SHI Yujiang WANG Zhenzhen MI Lan YUAN Chao ZHONG Jibin 《Petroleum Exploration and Development》 CSCD 2022年第3期572-585,共14页
Based on the well logging knowledge graph of hydrocarbon-bearing formation(HBF),a Knowledge-Powered Neural Network Formation Evaluation model(KPNFE)has been proposed.It has the following functions:(1)extracting charac... Based on the well logging knowledge graph of hydrocarbon-bearing formation(HBF),a Knowledge-Powered Neural Network Formation Evaluation model(KPNFE)has been proposed.It has the following functions:(1)extracting characteristic parameters describing HBF in multiple dimensions and multiple scales;(2)showing the characteristic parameter-related entities,relationships,and attributes as vectors via graph embedding technique;(3)intelligently identifying HBF;(4)seamlessly integrating expertise into the intelligent computing to establish the assessment system and ranking algorithm for potential pay recommendation.Taking 547 wells encountered the low porosity and low permeability Chang 6 Member of Triassic in the Jiyuan Block of Ordos Basin,NW China as objects,80%of the wells were randomly selected as the training dataset and the remainder as the validation dataset.The KPNFE prediction results on the validation dataset had a coincidence rate of 94.43%with the expert interpretation results and a coincidence rate of 84.38%for all the oil testing layers,which is 13 percentage points higher in accuracy and over 100 times faster than the primary conventional interpretation.In addition,a number of potential pays likely to produce industrial oil were recommended.The KPNFE model effectively inherits,carries forward and improves the expert knowledge,nicely solving the robustness problem in HBF identification.The KPNFE,with good interpretability and high accuracy of computation results,is a powerful technical means for efficient and high-quality well logging re-evaluation of old wells in mature oilfields. 展开更多
关键词 well logging hydrocarbon bearing formation identification knowledge graph graph embedding technique intelligent identification neural network
下载PDF
Study on the concentrated SF_6 quantitative intelligent ultrasonic detection system 被引量:1
3
作者 朱昌平 Bian Mangxi +2 位作者 Shan Minglei Yin Dongmei Yu Hongzhen 《High Technology Letters》 EI CAS 2010年第4期378-382,共5页
In order to realize on-line quantitative detection on SF6 and effective control of nlnning state of SF6 high voltage power supply system, a concentrated SF6 quantitative ultrasonic on-line deteetion system has been de... In order to realize on-line quantitative detection on SF6 and effective control of nlnning state of SF6 high voltage power supply system, a concentrated SF6 quantitative ultrasonic on-line deteetion system has been developed based on the actual demand of electric power system consumers. There are four major characteristics in this system. Firstly, the gas of maximum 64 detection points is transferred through the specific air path to the detection devices to he detected and analyzed, thereby the electrical lines and the complicated installation of the collectors can be avoided; secondly, the differential technique is used to shield the influence of environmental factors, which effectively improves the accuracy of the acoustic detection; thirdly, the SF6 coneentration is determined by the speed and phase in the ultrasonic wave trans- mission process, therefore there is no secondary pollution for the purely physical means; finally, the ma- ture embedded technique is applied in this system to improve its intelligence and stability. 展开更多
关键词 ultrasonic detection concentrated SF6 embedded technique
下载PDF
An ARM-based debugging system for multipole array acoustic logging tools
4
作者 Lu Junqiang Ju Xiaodong Men Baiyong 《Petroleum Science》 SCIE CAS CSCD 2014年第4期508-518,共11页
This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test eq... This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels. 展开更多
关键词 Acoustic logging tool debug system advanced RISC machines embedded technique network interconnection
下载PDF
Threshold Controlled Scheme of Difference Expansion Techniques for Reversible Watermarking
5
作者 蒋历军 郭小涛 +2 位作者 杨浩 赵俊 庄天戈 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第5期541-548,共8页
Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this pape... Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this paper,we proposed an expandable difference threshold controlled scheme for these three methods.Experiments show that our scheme improves the performance of these three methods for heavy payload. 展开更多
关键词 difference expansion embedding technique reversible watermarking visual quality difference threshold controlled scheme
原文传递
Fabrication of fiber-embedded multi-core photonic crystal fibers
6
作者 孙伟民 刘晓颀 +1 位作者 付枫华 张建中 《Chinese Optics Letters》 SCIE EI CAS CSCD 2008年第10期715-717,共3页
A novel fabrication method of multi-core photonic crystal fibers is proposed on the basis of a fiber-embedded technique. A taper tower is used to modify the structures of the fiber preform, and four steps of fiber fab... A novel fabrication method of multi-core photonic crystal fibers is proposed on the basis of a fiber-embedded technique. A taper tower is used to modify the structures of the fiber preform, and four steps of fiber fabrication and different structures of fiber samples are given. The mode structures and beating characteristics of a photonic crystal fiber sample with two successive cores are investigated in detail with the help of a supercontinuum light source, a charge-coupled device (CCD) camera, and an optical spectrum analyzer. The test results show a clear beating phenomenon between two orthotropic polarization modes with a 2.8-nm peak interval in wavelength. 展开更多
关键词 Charge coupled devices Crystal atomic structure Crystal whiskers FABRICATION Laser pulses Light Light sources Lighting Optical fiber fabrication Photonic crystals Powders Spectrum analyzers Coupled devices Embedded techniques Fabrication methods Mode structures Optical spectrum analyzers Photonic Crystal fibers Polarization modes Supercontinuum light sources Test results
原文传递
The Sensitivity Analysis for the Flow Past Obstacles Problem with Respect to the Reynolds Number
7
作者 Kazufumi Ito Zhilin Li Zhonghua Qiao 《Advances in Applied Mathematics and Mechanics》 SCIE 2012年第1期21-35,共15页
In this paper,numerical sensitivity analysis with respect to the Reynolds number for the flow past obstacle problem is presented.To carry out such analysis,at each time step,we need to solve the incompressible Navier-... In this paper,numerical sensitivity analysis with respect to the Reynolds number for the flow past obstacle problem is presented.To carry out such analysis,at each time step,we need to solve the incompressible Navier-Stokes equations on irregular domains twice,one for the primary variables;the other is for the sensitivity variables with homogeneous boundary conditions.The Navier-Stokes solver is the augmented immersed interface method for Navier-Stokes equations on irregular domains.One of the most important contribution of this paper is that our analysis can predict the critical Reynolds number at which the vortex shading begins to develop in the wake of the obstacle.Some interesting experiments are shown to illustrate how the critical Reynolds number varies with different geometric settings. 展开更多
关键词 Navier-Stokes equations sensitivity analysis flow past cylinder embedding technique immersed interface method irregular domain augmented system projection method fluid-solid interaction
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部