Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wavelet transforms
biblio
Feature Fingerprint Extraction and Abnormity Diagnosis Method of the Vibration on the GIS
Submitted by grigby1 on Wed, 01/20/2021 - 4:09pm
Gas insulation
wavelet transforms
Vibrations
vibration fingerprint
Resiliency
resilience
pubcrawl
mechanical vibration
Human behavior
Acoustic Fingerprints
Gas insulated switchgear (GIS)
Fingerprint recognition
feature extraction
condition monitoring and fault diagnosis
composability
Circuit faults
Acoustics
biblio
Effective and Fast DeepFake Detection Method Based on Haar Wavelet Transform
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
generated face
Blur inconsistency
blur inconsistency detection scheme
DeepFake detection method
DeepFake generation algorithms
DeepFake videos
distortion
exclusive blur inconsistency
face images
face region
fake face
DeepFake
Generative Adversarial Networks GANs
Haar transforms
Haar wavelet
Haar wavelet transform
high-quality fake videos
realistic manner
source video
surrounding context
Wavelet domain
Gallium nitride
Human behavior
Human Factors
Metrics
Resiliency
Scalability
neural nets
resilience
face recognition
feature extraction
pubcrawl
Image edge detection
gan
object detection
generative adversarial networks
Face
Videos
wavelet transforms
video signal processing
detection rate
biblio
A Novel Technique for Biometric Data Protection in Remote Authentication System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
biometric encryption
transmitted biometric data
Steganography
semantic segmentation
secret image
remote authentication system
Qualified Significant Wavelet Trees
IWT based data hiding increases
Integer Wavelet Transform
extracted fingerprint image
crypto-steganography method
cover image
chaotic encrypted fingerprint image
biometric features
biometric data protection
Cryptography
biometrics
wavelet transforms
image segmentation
fingerprint identification
feature extraction
resilience
Fingerprint recognition
biometrics (access control)
chaotic encryption
Scalability
Resiliency
Metrics
pubcrawl
biblio
A blind watermarking technique using redundant wavelet transform for copyright protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
redundant wavelet transform
copyright protection
digital images
digital watermarking technique
geometrical attacks
host image
hybrid blind watermarking technique
hybrid scheme RDWT-SVD
JPEG2000 compression
modified entropy
orthogonal matrix
blind watermarking technique
redundant weavelet transform
signal processing
singular value decomposition
Transform coding
watermark embedding locations
watermark extraction
watermark image
watermark insertion
wavelet transforms
Robustness
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
intellectual property
Entropy
composability
Metrics
pubcrawl
Low pass filters
Image coding
data compression
image watermarking
Watermarking
copyright
copy protection
ip protection
Arnold chaotic map
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
neural network
wavelet transforms
wavelet transform
unauthorized external influences
signal processing security
security of data
security management process
Resiliency
pubcrawl
privacy
Neural networks
Dynamical Systems
neural nets
Metrics
mathematical modeling
information system
impact
dynamic analysis
conflict
composability
adaptive response unit
biblio
Tools for Investigating the Phishing Attacks Dynamics
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
phishing attacks detection
wavelet transforms
wavelet coherence.
wavelet coherence
wavelet analysis
tools
the chaos theory
Stability analysis
pubcrawl
phishing attacks occurrence
phishing attacks dynamics
a phase portrait
Phishing
human factor
Human behavior
estimation
computer network security
Computer crime
Coherence
chaos theory
chaos
biblio
Image Steganography Using Combine of Discrete Wavelet Transform and Singular Value Decomposition for More Robustness and Higher Peak Signal Noise Ratio
Submitted by grigby1 on Mon, 08/12/2019 - 3:23pm
image technique discrete wavelet transform
wavelet transforms
Watermarking
Steganography
singular value decomposition performance
singular value decomposition method
Singular Value Decomposition (SVD)
singular value decomposition
Robustness
pubcrawl
Peak Signal Noise Ratio (PSNR)
Metrics
Mean Squared Error (MSE)
mean squared error
Compositionality
Image Steganography
Image coding
higher peak signal noise ratio
frequency-domain analysis
encryption method
discrete wavelet transforms
Discrete Wavelet Transform (DWT)
discrete cosine transforms
discrete cosine transform
decomposition
Cyber Physical System
Cryptography
biblio
Identification of Potential Risks to System Security Using Wavelet Analysis, the Time-and-Frequency Distribution Indicator of the Time Series and the Correlation Analysis of Wavelet-Spectra
Submitted by grigby1 on Fri, 03/15/2019 - 11:55am
Resiliency
wavelet transforms
wavelet spectra correlation analysis
wavelet analysis
time-and-frequency localization
time-and-frequency distribution
Time series analysis
time series
Time Frequency Analysis
system security
security
Scalability
Accidents
resilience
pubcrawl
potential system security threat prediction identification
potential risks
potential risk
Metrics
Injuries
correlation methods
Correlation analysis
Correlation
biblio
Distributed Osmotic Computing Approach to Implementation of Explainable Predictive Deep Learning at Industrial IoT Network Edges with Real-Time Adaptive Wavelet Graphs
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
osmotic microservice
graph-based approach
IIoT network fog layer
IIoT systems
Industrial IoT
industrial IoT network edges
IoT development costs
large scale industrial Internet of Things
Logic gates
low-level machine language
LSTM networks
network cloud layer
graph theory
real-time
real-time adaptive wavelet graphs
real-time DSP
real-time graph-based Coiflet wavelets
real-time systems
system complexities
wavelet analysis
Wavelet Graph
wavelet transforms
XAI deep learning pre-processing applications
deep learning
Internet of Things
resilience
pubcrawl
Resiliency
Scalability
Hardware
xai
learning (artificial intelligence)
artificial intelligence deep learning problem
communication network noise
data quality
Cloud Computing
delay time
delays
digital signal processing chips
digital signal processor
distributed computing
distributed edge computing
distributed osmotic computing approach
distributed processing
edge layer
explainable artificial intelligence
« first
‹ previous
1
2
3
4
next ›
last »