Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Comparison of different image data augmentation approaches
Convolutional neural networks (CNNs) have gained prominence in the research literature
on image classification over the last decade. One shortcoming of CNNs, however, is their …
on image classification over the last decade. One shortcoming of CNNs, however, is their …
Biometric authentication and image encryption for image security in cloud framework
Cloud computing is a major blooming technology which has numerous applications in
today's market and is rightly so hyped. Images are a major part of today's internet data traffic …
today's market and is rightly so hyped. Images are a major part of today's internet data traffic …
Prospect of using artificial intelligence for microwave nondestructive testing technique: A review
The development in materials technology has produced stronger, lighter, stiffer, and more
durable electrically insulating composites which are replacing metals in many applications …
durable electrically insulating composites which are replacing metals in many applications …
[KÖNYV][B] Some commonly used speech feature extraction algorithms
SA Alim, NKA Rashid - 2018 - books.google.com
Speech is a complex naturally acquired human motor ability. It is characterized in adults with
the production of about 14 different sounds per second via the harmonized actions of …
the production of about 14 different sounds per second via the harmonized actions of …
Student attendance system in classroom using face recognition technique
Authentication is one of the significant issues in the era of information system. Among other
things, human face recognition (HFR) is one of known techniques which can be used for …
things, human face recognition (HFR) is one of known techniques which can be used for …
Medical image watermarking for ownership & tamper detection
HS Alshanbari - Multimedia tools and applications, 2021 - Springer
Image watermarking can provide ownership identification as well as tamper protection.
Transform domain based image watermarking has been proven to be more robust than the …
Transform domain based image watermarking has been proven to be more robust than the …
A comprehensive experimental study for analyzing the effects of data augmentation techniques on voice classification
It is not always possible to find enough data for deep learning studies. So, various data
augmentation techniques have been developed and thus the success of deep learning …
augmentation techniques have been developed and thus the success of deep learning …
[PDF][PDF] A brief survey on modern iris feature extraction methods
Engineering and Technology Journal A Brief Survey on Modern Iris Feature Extraction Methods
Page 1 Engineering and Technology Journal Vol. 39, Part A (2021), No. 01, Pages 123-129 …
Page 1 Engineering and Technology Journal Vol. 39, Part A (2021), No. 01, Pages 123-129 …
RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique
Abstract Secret Image Sharing (SIS) scheme is to encrypt a secret image into 'n'specious
shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …
shadows. It is unable to reveal any data on the secret image if at least one of the shadows is …
Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map
A novel quantum image compression and encryption algorithm with Daubechies D^(4) D (4)
quantum wavelet transform (DQWT) and 3D hyper-chaotic Henon map is presented. The …
quantum wavelet transform (DQWT) and 3D hyper-chaotic Henon map is presented. The …