Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Image edge detection
biblio
Multi-direction Edge Detection Operator
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
noise rejection ability
wavelet transforms
Transforms
the shear transformation
standards
single-pixel edge images
shear transformation
Sensitivity
security
Scalability
Resiliency
resilience
pubcrawl
noisy images
composability
Noise measurement
multidirection edge detection operator
multi-direction edge detection operator
Metrics
mathematical operators
matched edges
Image edge detection
image denoising
false edges
edge extraction
edge detection
convolution
Computed tomography
biblio
Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images
Submitted by grigby1 on Mon, 02/08/2021 - 2:01pm
security
Metrics
MSE
peak signal-to-noise ratio
PSNR
pubcrawl
resilience
Resiliency
Scalability
message security
SSIM
Steganography
stereo image processing
structural similarity index measure
Three-dimensional displays
Two dimensional displays
visualization
Image coding
AES-256
AES–256
composability
Cryptography
Data Security
edge detected pixels
edge detection
Entropy
3D cover images
Image edge detection
LSB embedding
LSB steganography
MAE
mean absolute error
mean square error
mean square error methods
biblio
Enhanced Image Edge Detection Methods for Crab Species Identification
Submitted by grigby1 on Mon, 02/08/2021 - 2:01pm
resilience
Image Segmentation Methods
Industrial applications demand Image
Laplace equations
Laplacian of Gaussian
Metrics
morphological operations
Object recognition
Otsu Segmentation
Prewitt Operator
pubcrawl
image segmentation
Resiliency
Robert Operator
Robert operators
sample images
Scalability
security
Sobel operator
Sobel operators
spurious edges
Thresholding (Imaging)
edge detection
automatic image analysis
automatic object recognition
biological applications demand Image
Canny edge detection
Communication networks
composability
conducted analysis
crab images
crab species identification
digital image processing application
aspiring research areas
edge detection operators
Enhanced Image edge detection methods
enhanced prewitt operator
enhanced robert operator
feature extraction
image classification
image data
Image edge detection
image enhancement
biblio
A THz Image Edge Detection Method Based on Wavelet and Neural Network
Submitted by grigby1 on Mon, 02/08/2021 - 2:00pm
neural network method
wavelet transforms
wavelet transform method
wavelet decomposition
wavelet analysis
wavelet
THz image edge detection method
terahertz waves
terahertz wave imaging
security
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
Neural networks
Canny operator method
neural network
neural nets
Metrics
low-frequency subimage detection
information security
image recognition
Image Processing
image fusion
Image edge detection
Image analysis
frequency
Electromagnetic radiation
edge image fusion
edge detection
composability
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
Effective and Fast DeepFake Detection Method Based on Haar Wavelet Transform
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
generated face
Blur inconsistency
blur inconsistency detection scheme
DeepFake detection method
DeepFake generation algorithms
DeepFake videos
distortion
exclusive blur inconsistency
face images
face region
fake face
DeepFake
Generative Adversarial Networks GANs
Haar transforms
Haar wavelet
Haar wavelet transform
high-quality fake videos
realistic manner
source video
surrounding context
Wavelet domain
Gallium nitride
Human behavior
Human Factors
Metrics
Resiliency
Scalability
neural nets
resilience
face recognition
feature extraction
pubcrawl
Image edge detection
gan
object detection
generative adversarial networks
Face
Videos
wavelet transforms
video signal processing
detection rate
biblio
Classifier with Deep Deviation Detection in PoE-IoT Devices
Submitted by aekwall on Mon, 01/11/2021 - 1:37pm
Decision trees
vulnerable IoT devices
PoE-IoT devices
PoE-IoT classification
poe
network traffic characteristics
ML
edge intelligence
deep deviation detection
behavior analysis
dpi
deep packet inspection
IoT
Switches
Cameras
computer network security
firmware
Image edge detection
Decision Tree
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
feature extraction
security
Internet of Things
telecommunication traffic
Scalability
Monitoring
biblio
Combined Layer GAN for Image Style Transfer*
Submitted by grigby1 on Fri, 12/11/2020 - 2:55pm
Generators
Scalability
Resiliency
resilience
pubcrawl
neural style transfer
neural nets
Metrics
image style transfer
image mapping
Image edge detection
image colour analysis
Image color analysis
color constrains
generative adversarial networks
GAN based image translation
Gallium nitride
edge-constraint
edge detection
edge
deep network
constraint
Conferences
computer vision
combined layer GAN
color tune
biblio
Research of Low-Quality Laser Security Code Enhancement Technique
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
bilateral filter
adaptive filtering
Unsharp masking
mean square error methods
market circulation order
low-quality laser security code enhancement
Lasers
Laser security code
interference background
image enhancement algorithm
equalisers
contrast limited adaptive histogram equalization
Scalability
image enhancement
image colour analysis
image filtering
Interference
Filtering
filtering algorithms
Metrics
Image edge detection
pubcrawl
Resiliency
security
biblio
Machine Learning Security Allocation in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
pubcrawl
IoT situation
IoT-helped vitality obliged stages
learning (artificial intelligence)
light-weighted profound learning base framework
Metrics
mobile phones
nearby facial pictures dataset
numerous asset compelled gadgets mobile phones
ongoing facial picture recovery frameworks
picture utilizing Viola-Jones calculation
proficiency
IoT condition
question
Raspberry Pi
Resiliency
Scalability
security
security allocation
Shape
Support vector machines
utilizes convolutional framework layers
Viola-Jones calculation
vitality obliged gadgets
extra face classifier
cell phones
Cellular phones
characterized highlights
CNN
composability
computational abilities
computational intricacy
constant recovery
convolutional neural nets
crop face areas
edge detection
archive pictures
Face
face pictures
face recognition
feature extraction
financially savvy pre-prepared CNN
huge information vault
Image edge detection
Internet of Things
IoT
IoT applications
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »