Data, Engineering and Applications 2019
DOI: 10.1007/978-981-13-6351-1_26
|View full text |Cite
|
Sign up to set email alerts
|

A New Model of M-secure Image Via Quantization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…According to Yang and colleagues (2010) [ 43 ], an approach that is more efficient than the previous one may be achieved by combining conventional algorithms with bandwidth adaptive algorithms. Identifying and tracking the target is accomplished by the use of background removal in combination with the mean shift target tracking technique [ 44 ]. A model update strategy based on an object kernel histogram was proposed, with the object kernel histogram serving as the basis.…”
Section: Literature Surveymentioning
confidence: 99%
“…According to Yang and colleagues (2010) [ 43 ], an approach that is more efficient than the previous one may be achieved by combining conventional algorithms with bandwidth adaptive algorithms. Identifying and tracking the target is accomplished by the use of background removal in combination with the mean shift target tracking technique [ 44 ]. A model update strategy based on an object kernel histogram was proposed, with the object kernel histogram serving as the basis.…”
Section: Literature Surveymentioning
confidence: 99%
“…Other important approaches found in the literature include ND for mobile WSN [ 27 , 36 ], RSSI for distance measure [ 28 ], self-adaptive ND [ 37 ], proactive ND for mobiles [ 38 ], ND with slot length control [ 39 ], ND with multipacket reception model [ 30 ], ND model known as Panacea [ 40 ], prime number-based ND [ 41 ], and group-based ND [ 32 ]. Secure critical data reclamation methods for isolated clusters in WSN were proposed in [ 33 , 42 ].…”
Section: Related Workmentioning
confidence: 99%
“…According to Figure 8(b) , the complete remaining potency of the system per unit of time stays constant up to and including the death of the first node [ 33 ], regardless of the state of the other nodes in the network [ 34 , 35 ]. As a consequence, the procedure is performed over and over again until the simulation period has been reached.…”
Section: Proposed Energy Protocol With Blockchainmentioning
confidence: 99%