Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Low-cost technologies used in corrosion monitoring
Globally, corrosion is the costliest cause of the deterioration of metallic and concrete
structures, leading to significant financial losses and unexpected loss of life. Therefore …
structures, leading to significant financial losses and unexpected loss of life. Therefore …
DCT-based color digital image blind watermarking method with variable steps
In this paper, a blind watermarking method for color digital image based on DCT domain
with variable steps is proposed to solve the copyright protection of color digital image. In this …
with variable steps is proposed to solve the copyright protection of color digital image. In this …
Siamese dense neural network for software defect prediction with small data
Software defect prediction (SDP) exerts a major role in software development, concerning
reducing software costs and ensuring software quality. However, develo** an accurate …
reducing software costs and ensuring software quality. However, develo** an accurate …
A novel triple recovery information embedding approach for self-embedded digital image watermarking
Image tamper detection and recovery has become an important issue in recent years. In
order to detect and recover high tampering rated images, this paper presents a novel self …
order to detect and recover high tampering rated images, this paper presents a novel self …
Blind semi-fragile watermarking scheme for video authentication in video surveillance context
With the development of advanced multimedia editing tools, numerous unauthorized
manipulations are easily doable to surveillance systems video files. Thus, video tamper …
manipulations are easily doable to surveillance systems video files. Thus, video tamper …
Multi-class blind steganalysis using deep residual networks
Camouflaged communication using a media is known as Steganography. It is different than
encryption as the presence of message is also concealed in case of steganography. The …
encryption as the presence of message is also concealed in case of steganography. The …
Energy efficient data gathering technique based on optimal mobile sink node selection for improved network life time in wireless sensor network (WSN)
The utilization of mobile sink in spite of its points of interest carries new difficulties to WSNs.
The principle disputes are the position update of sink node to the hub. Every sensor hub …
The principle disputes are the position update of sink node to the hub. Every sensor hub …
A unified cycle-consistent neural model for text and image retrieval
Text-image retrieval has been recently becoming a hot-spot research field, thanks to the
development of deeply-learnable architectures which can retrieve visual items given textual …
development of deeply-learnable architectures which can retrieve visual items given textual …
Optimized clustering-based discovery framework on internet of things
With the proliferation of technology, a system of connected and interconnected devices,
henceforth referred to as Internet of Things, is emerging as a viable method for automated …
henceforth referred to as Internet of Things, is emerging as a viable method for automated …
A novel audio watermarking scheme based on fuzzy inference system in DCT domain
Digital watermarking technology provides an effective potential solution to copyright
protection and authentication of digital media. In this article, a new design of audio …
protection and authentication of digital media. In this article, a new design of audio …