Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
Blockchain meets covert communication: A survey
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …
prevent the exposure of communication behaviors. Blockchain-based covert communication …
A survey on blockchain technology: Evolution, architecture and security
Blockchain is a revolutionary technology that is making a great impact on modern society
due to its transparency, decentralization, and security properties. Blockchain gained …
due to its transparency, decentralization, and security properties. Blockchain gained …
Blockchain security attacks, challenges, and solutions for the future distributed iot network
Blockchain technology is becoming increasingly attractive to the next generation, as it is
uniquely suited to the information era. Blockchain technology can also be applied to the …
uniquely suited to the information era. Blockchain technology can also be applied to the …
Apple leaf disease recognition method with improved residual network
H Yu, X Cheng, C Chen, AA Heidari, J Liu, Z Cai… - Multimedia Tools and …, 2022 - Springer
The occurrence of apple diseases has dramatically affected the quality and yield of apples.
Disease monitoring is an important measure to ensure the healthy development of the apple …
Disease monitoring is an important measure to ensure the healthy development of the apple …
Boosting whale optimization with evolution strategy and Gaussian random walks: An image segmentation method
AG Hussien, AA Heidari, X Ye, G Liang, H Chen… - Engineering with …, 2023 - Springer
Stochastic optimization has been found in many applications, especially for several local
optima problems, because of their ability to explore and exploit various zones of the feature …
optima problems, because of their ability to explore and exploit various zones of the feature …
Boosted kernel search: Framework, analysis and case studies on the economic emission dispatch problem
R Dong, H Chen, AA Heidari, H Turabieh… - Knowledge-Based …, 2021 - Elsevier
In recent years, a variety of meta-heuristic nature-inspired algorithms have been proposed to
solve complex optimization problems. However, these algorithms suffer from the …
solve complex optimization problems. However, these algorithms suffer from the …
Multilevel threshold image segmentation with diffusion association slime mould algorithm and Renyi's entropy for chronic obstructive pulmonary disease
S Zhao, P Wang, AA Heidari, H Chen… - Computers in Biology …, 2021 - Elsevier
Image segmentation is an essential pre-processing step and is an indispensable part of
image analysis. This paper proposes Renyi's entropy multi-threshold image segmentation …
image analysis. This paper proposes Renyi's entropy multi-threshold image segmentation …
Secure and efficient mutual authentication protocol for smart grid under blockchain
Smart grid has been acknowledged as the next-generation intelligent network that optimizes
energy efficiency. Primarily through a bidirectional communication channel, suppliers and …
energy efficiency. Primarily through a bidirectional communication channel, suppliers and …
Random reselection particle swarm optimization for optimal design of solar photovoltaic modules
Renewable energy is becoming more popular due to environmental concerns about the
previous energy source. Accurate solar photovoltaic system model parameters substantially …
previous energy source. Accurate solar photovoltaic system model parameters substantially …