Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Real-time water quality monitoring using Internet of Things in SCADA
Water pollution is the root cause for many diseases in the world. It is necessary to measure
water quality using sensors for prevention of water pollution. However, the related works …
water quality using sensors for prevention of water pollution. However, the related works …
Optimized multimedia data through computationally intelligent algorithms
In the field of data exchange, the security of information is the critical aspect. This void in the
security helped the evolution of steganography to address the problem of security …
security helped the evolution of steganography to address the problem of security …
A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks
With the wide applications of wireless sensor networks (WSNs) in various fields, such as
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …
Image data hiding schemes based on metaheuristic optimization: a review
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …
Hiding data in digital images is a promising direction in data protection and is an alternative …
A new fusion of salp swarm with sine cosine for optimization of non-linear functions
The foremost objective of this article is to develop a novel hybrid powerful meta-heuristic that
integrates the salp swarm algorithm with sine cosine algorithm (called HSSASCA) for …
integrates the salp swarm algorithm with sine cosine algorithm (called HSSASCA) for …
An optimized steganography hiding capacity and imperceptibly using genetic algorithms
In stenography, embedding data within an image has a trade-off between image quality and
embedding capacity. Specifically, the more data are concealed within a carrier image, the …
embedding capacity. Specifically, the more data are concealed within a carrier image, the …
Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain
Image steganography and watermarking have demonstrated their efficiency in creating a
covert communication channel and in digital image authentication respectively. The …
covert communication channel and in digital image authentication respectively. The …
Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …
confidential data over the internet. Here the authors use image steganography to embed …
[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …
Cryptography can be used to secure the information, but it discloses the presence of covert …
Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks
In this paper, we propose a new power-aware routing protocol for Wireless Sensor Network
(WSN) based on the threshold rate and fuzzy logic for improving energy efficiency. The …
(WSN) based on the threshold rate and fuzzy logic for improving energy efficiency. The …