![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Enhancing Carbon Sequestration through Afforestation: Evaluating the Impact of Land Use and Cover Changes on Carbon Storage Dynamics
Carbon sequestration is crucial for achieving net zero emissions and plays a vital role in mitigating climate change. However, changes in forest cover are having a significant impact on the amount of carbon st...
-
Article
Bengali Stop Word and Phrase Detection Mechanism
Though plenty of research works have been done on stop word/phrase detection, there is no work done on Bengali stop words and stop phrases. This research innovates the definition and classification of Bengali ...
-
Article
Quantum-behaved bat algorithm for many-objective combined economic emission dispatch problem using cubic criterion function
In this research, a quantum computing idea based bat algorithm (QBA) is proposed to solve many-objective combined economic emission dispatch (CEED) problem. Here, CEED is represented using cubic criterion func...
-
Article
Open AccessA histogram specification technique for dark image enhancement using a local transformation method
Traditional image enhancement techniques produce different types of noise such as unnatural effects, over-enhancement, and artifacts, and these drawbacks become more prominent in enhancing dark images. To over...
-
Chapter and Conference Paper
Quantum-Behaved Bat Algorithm for Combined Economic Emission Dispatch Problem with Valve-Point Effect
Combined economic emission dispatch (CEED) is a multi-objective optimization problem that deals with the minimization of total fuel cost and total emission of hazardous gases in thermal power generation system...
-
Article
Open AccessAn adaptive gamma correction for image enhancement
Due to the limitations of image-capturing devices or the presence of a non-ideal environment, the quality of digital images may get degraded. In spite of much advancement in imaging science, captured images do...
-
Article
An energy-efficient common control channel selection mechanism for Cognitive Radio Ad Hoc Networks
A common control channel (CCC) is required in Cognitive Radio Ad Hoc Networks (CRAHNs) for exchanging vital control messages among the cognitive radio users. However, selecting a CCC in CRAHNs is a challenging...
-
Chapter and Conference Paper
Hybrid Swarm Intelligence-Based Optimization for Charging Plug-in Hybrid Electric Vehicle
Plug-in hybrid electric vehicle (PHEV) has the potential to facilitate the energy and environmental aspects of personal transportation, but face a hurdle of access to charging system. The charging infrastructu...
-
Article
A fault-tolerant structural health monitoring protocol using wireless sensor networks
In wireless sensor network-based event detection approaches, when the decision is taken based on the measurements of sensors, sensor-fault and noise-related measurement error should be taken into account. Usin...
-
Chapter and Conference Paper
Facial Expression Classification Based on Dempster-Shafer Theory of Evidence
Facial expression recognition is a well discussed problem. Several machine learning methods are used in this regard. Among them, Adaboost is popular for its simplicity and considerable accuracy. In Adaboost, d...
-
Chapter and Conference Paper
Image Enhancement Using a Modified Histogram Equalization
Image enhancement algorithms based on Histogram equalization (HE) often fall short to maintain the image quality after enhancement due to quantum jump in the cumulative distribution function (CDF) in the histo...
-
Chapter and Conference Paper
Fast Reconstruction Technique for Medical Images Using Graphics Processing Unit
In many medical imaging modalities, the Fast Fourier Transform (FFT) is being used for the reconstruction of images from acquired raw data. The objective of the paper is to develop FFT and Inverse FT algorithm...
-
Chapter and Conference Paper
Minimum Distortion Data Hiding
In this paper a new steganographic method is presented with minimum distortion, and better resistance against steganalysis. There are two ways to control detectability of stego message: one is less distortion,...
-
Chapter and Conference Paper
Concurrent Covert Communication Channels
This paper introduces a new steganographic technique in which a set of concurrent hidden channels are established between a sender and multiple receivers. Each channel is protected by a separate key. The metho...
-
Chapter and Conference Paper
An Analysis of Syndrome Coding
In this paper a detail analysis is presented based on BCH syndrome coding for covert channel data hiding methods. The experimented technique is nothing but a syndrome coding algorithm with a coset based approa...
-
Article
A robust security scheme for wireless mesh enterprise networks
In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devi...
-
Article
Open AccessA Skin Detection Approach Based on Color Distance Map
We propose a reliable approach to detect skin regions that can be used in various human-related image processing applications. We use a color distance map, which itself is a grayscale image making the process ...
-
Chapter and Conference Paper
An Improved Steganography Covert Channel
An improved steganographic method is proposed in this paper. Two distinct methods are combined to achieve possibly high data hiding capability with high visual quality. The proposed method shifts the last n nonze...
-
Chapter and Conference Paper
A Fast Algorithm to Calculate Powers of a Boolean Matrix for Diameter Computation of Random Graphs
In this paper, a fast algorithm is proposed to calculate k th power of an n×n Boolean matrix that requires O(kn 3 ...
-
Chapter and Conference Paper
Minimizing the Search Space for Shape Retrieval Algorithms
To provide satisfactory accuracy and flexibility, most of the existing shape retrieval methods make use of different alignments and translations of the objects that introduce much computational complexity. The...