This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding...This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size.At each step,the SVD is determined.First,the diagonal matrix’s maximum value(norm)is selected(representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating thematrix or scaled).Then,the similar norms are grouped,and each leading group is separated into many subgroups(elements of each subgroup are neighbors)according to 8-adjacency(the subgroups for each leading group must be far from others by a specific distance).After that,a weight is assigned for each subgroup to classify the image as forgery or not.Finally,the F1 score of the proposed system is measured,reaching 99.1%.This approach is robust against rotation,scaling,noisy images,and illumination variation.It is compared with other similarmethods and presents very promised results.展开更多
Text extraction from images using the traditional techniques of image collecting,and pattern recognition using machine learning consume time due to the amount of extracted features from the images.Deep Neural Networks...Text extraction from images using the traditional techniques of image collecting,and pattern recognition using machine learning consume time due to the amount of extracted features from the images.Deep Neural Networks introduce effective solutions to extract text features from images using a few techniques and the ability to train large datasets of images with significant results.This study proposes using Dual Maxpooling and concatenating convolution Neural Networks(CNN)layers with the activation functions Relu and the Optimized Leaky Relu(OLRelu).The proposed method works by dividing the word image into slices that contain characters.Then pass them to deep learning layers to extract feature maps and reform the predicted words.Bidirectional Short Memory(BiLSTM)layers extractmore compelling features and link the time sequence fromforward and backward directions during the training phase.The Connectionist Temporal Classification(CTC)function calcifies the training and validation loss rates.In addition to decoding the extracted feature to reform characters again and linking them according to their time sequence.The proposed model performance is evaluated using training and validation loss errors on the Mjsynth and Integrated Argument Mining Tasks(IAM)datasets.The result of IAM was 2.09%for the average loss errors with the proposed dualMaxpooling and OLRelu.In the Mjsynth dataset,the best validation loss rate shrunk to 2.2%by applying concatenating CNN layers,and Relu.展开更多
The number of mobile devices accessing wireless networks isskyrocketing due to the rapid advancement of sensors and wireless communicationtechnology. In the upcoming years, it is anticipated that mobile datatraffic wo...The number of mobile devices accessing wireless networks isskyrocketing due to the rapid advancement of sensors and wireless communicationtechnology. In the upcoming years, it is anticipated that mobile datatraffic would rise even more. The development of a new cellular networkparadigm is being driven by the Internet of Things, smart homes, and moresophisticated applications with greater data rates and latency requirements.Resources are being used up quickly due to the steady growth of smartphonedevices andmultimedia apps. Computation offloading to either several distantclouds or close mobile devices has consistently improved the performance ofmobile devices. The computation latency can also be decreased by offloadingcomputing duties to edge servers with a specific level of computing power.Device-to-device (D2D) collaboration can assist in processing small-scaleactivities that are time-sensitive in order to further reduce task delays. The taskoffloading performance is drastically reduced due to the variation of differentperformance capabilities of edge nodes. Therefore, this paper addressed thisproblem and proposed a new method for D2D communication. In thismethod, the time delay is reduced by enabling the edge nodes to exchangedata samples. Simulation results show that the proposed algorithm has betterperformance than traditional algorithm.展开更多
Flue gas heat loss accounts for a significant component of theoverall heat loss for coal-fired boilers in power plants. The flue gas absorbsmore heat as the exhaust gas temperature rises, which reduces boiler efficien...Flue gas heat loss accounts for a significant component of theoverall heat loss for coal-fired boilers in power plants. The flue gas absorbsmore heat as the exhaust gas temperature rises, which reduces boiler efficiencyand raises coal consumption. Additionally, if the exhaust gas temperatureis too high, a lot of water must be used to cool the flue gas for the wetflue gas desulfurization system to function well, which has an impact onthe power plant’s ability to operate profitably. It is consequently vital totake steps to lower exhaust gas temperatures in order to increase boilerefficiency and decrease the amount of coal and water used. Desulfurizationperformance may be enhanced and water use can be decreased by reasonableflue gas characteristics at the entry. This study analyzed the unit’s energyconsumption, investment, and coal savings while proposing four couplingstrategies for regulating flue gas temperature and waste heat recovery. Agraded flue gas conditioning and waste heat recovery plan was presentedunder the condition of ensuring high desulfurization efficiency, along withthe notion of minimizing energy loss owing to energy inflow temperaturedifference. Numerical results show that the proposed methods improved thesystem performance and reduced the water consumption and regulated theboiler temperature.展开更多
文摘This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size.At each step,the SVD is determined.First,the diagonal matrix’s maximum value(norm)is selected(representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating thematrix or scaled).Then,the similar norms are grouped,and each leading group is separated into many subgroups(elements of each subgroup are neighbors)according to 8-adjacency(the subgroups for each leading group must be far from others by a specific distance).After that,a weight is assigned for each subgroup to classify the image as forgery or not.Finally,the F1 score of the proposed system is measured,reaching 99.1%.This approach is robust against rotation,scaling,noisy images,and illumination variation.It is compared with other similarmethods and presents very promised results.
基金supported this project under the Fundamental Research Grant Scheme(FRGS)FRGS/1/2019/ICT02/UKM/02/9 entitled“Convolution Neural Network Enhancement Based on Adaptive Convexity and Regularization Functions for Fake Video Analytics”.This grant was received by Prof.Assis.Dr.S.N.H.Sheikh Abdullah,https://www.ukm.my/spifper/research_news/instrumentfunds.
文摘Text extraction from images using the traditional techniques of image collecting,and pattern recognition using machine learning consume time due to the amount of extracted features from the images.Deep Neural Networks introduce effective solutions to extract text features from images using a few techniques and the ability to train large datasets of images with significant results.This study proposes using Dual Maxpooling and concatenating convolution Neural Networks(CNN)layers with the activation functions Relu and the Optimized Leaky Relu(OLRelu).The proposed method works by dividing the word image into slices that contain characters.Then pass them to deep learning layers to extract feature maps and reform the predicted words.Bidirectional Short Memory(BiLSTM)layers extractmore compelling features and link the time sequence fromforward and backward directions during the training phase.The Connectionist Temporal Classification(CTC)function calcifies the training and validation loss rates.In addition to decoding the extracted feature to reform characters again and linking them according to their time sequence.The proposed model performance is evaluated using training and validation loss errors on the Mjsynth and Integrated Argument Mining Tasks(IAM)datasets.The result of IAM was 2.09%for the average loss errors with the proposed dualMaxpooling and OLRelu.In the Mjsynth dataset,the best validation loss rate shrunk to 2.2%by applying concatenating CNN layers,and Relu.
文摘The number of mobile devices accessing wireless networks isskyrocketing due to the rapid advancement of sensors and wireless communicationtechnology. In the upcoming years, it is anticipated that mobile datatraffic would rise even more. The development of a new cellular networkparadigm is being driven by the Internet of Things, smart homes, and moresophisticated applications with greater data rates and latency requirements.Resources are being used up quickly due to the steady growth of smartphonedevices andmultimedia apps. Computation offloading to either several distantclouds or close mobile devices has consistently improved the performance ofmobile devices. The computation latency can also be decreased by offloadingcomputing duties to edge servers with a specific level of computing power.Device-to-device (D2D) collaboration can assist in processing small-scaleactivities that are time-sensitive in order to further reduce task delays. The taskoffloading performance is drastically reduced due to the variation of differentperformance capabilities of edge nodes. Therefore, this paper addressed thisproblem and proposed a new method for D2D communication. In thismethod, the time delay is reduced by enabling the edge nodes to exchangedata samples. Simulation results show that the proposed algorithm has betterperformance than traditional algorithm.
文摘Flue gas heat loss accounts for a significant component of theoverall heat loss for coal-fired boilers in power plants. The flue gas absorbsmore heat as the exhaust gas temperature rises, which reduces boiler efficiencyand raises coal consumption. Additionally, if the exhaust gas temperatureis too high, a lot of water must be used to cool the flue gas for the wetflue gas desulfurization system to function well, which has an impact onthe power plant’s ability to operate profitably. It is consequently vital totake steps to lower exhaust gas temperatures in order to increase boilerefficiency and decrease the amount of coal and water used. Desulfurizationperformance may be enhanced and water use can be decreased by reasonableflue gas characteristics at the entry. This study analyzed the unit’s energyconsumption, investment, and coal savings while proposing four couplingstrategies for regulating flue gas temperature and waste heat recovery. Agraded flue gas conditioning and waste heat recovery plan was presentedunder the condition of ensuring high desulfurization efficiency, along withthe notion of minimizing energy loss owing to energy inflow temperaturedifference. Numerical results show that the proposed methods improved thesystem performance and reduced the water consumption and regulated theboiler temperature.