Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital image and video watermarking: methodologies, attacks, applications, and future directions
In recent years, internet technology has grown in advance, and multimedia data-sharing
growth rates have skyrocketed. As a result, protecting multimedia data in digital networks …
growth rates have skyrocketed. As a result, protecting multimedia data in digital networks …
A review on food recognition technology for health applications
Food understanding from digital media has become a challenge with important applications
in many different domains. On the other hand, food is a crucial part of human life since the …
in many different domains. On the other hand, food is a crucial part of human life since the …
Local binary features for texture classification: Taxonomy and experimental study
Abstract Local Binary Patterns (LBP) have emerged as one of the most prominent and
widely studied local texture descriptors. Truly a large number of LBP variants has been …
widely studied local texture descriptors. Truly a large number of LBP variants has been …
Human detection from images and videos: A survey
The problem of human detection is to automatically locate people in an image or video
sequence and has been actively researched in the past decade. This paper aims to provide …
sequence and has been actively researched in the past decade. This paper aims to provide …
LBP-based edge-texture features for object recognition
This paper proposes two sets of novel edge-texture features, Discriminative Robust Local
Binary Pattern (DRLBP) and Ternary Pattern (DRLTP), for object recognition. By …
Binary Pattern (DRLBP) and Ternary Pattern (DRLTP), for object recognition. By …
A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network
EH Abualsauod - Computers and Electrical Engineering, 2022 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) offer a huge amount of potential in a variety of
applications, including healthcare, medical, traffic monitoring, military, and industry. UAVs …
applications, including healthcare, medical, traffic monitoring, military, and industry. UAVs …
Distinguishing malicious drones using vision transformer
Drones are commonly used in numerous applications, such as surveillance, navigation,
spraying pesticides in autonomous agricultural systems, various military services, etc., due …
spraying pesticides in autonomous agricultural systems, various military services, etc., due …
[HTML][HTML] Malicious UAV detection using integrated audio and visual features for public safety applications
Unmanned aerial vehicles (UAVs) have become popular in surveillance, security, and
remote monitoring. However, they also pose serious security threats to public privacy. The …
remote monitoring. However, they also pose serious security threats to public privacy. The …
Classification and identification of tomato leaf disease using deep neural network
A Batool, SB Hyder, A Rahim, N Waheed… - … on Engineering and …, 2020 - ieeexplore.ieee.org
Agricultural productivity is something on which the economy highly depends. In addition to
this, plant diseases and pests are a major problem in the agricultural sector. Their detection …
this, plant diseases and pests are a major problem in the agricultural sector. Their detection …
Retrieval and classification of food images
Automatic food understanding from images is an interesting challenge with applications in
different domains. In particular, food intake monitoring is becoming more and more important …
different domains. In particular, food intake monitoring is becoming more and more important …