Learn More
In this letter, we propose a method for real-time high density impulse noise suppression from images. In our method, we first apply an impulse detector to identify the corrupted pixels and then employ an innovative weighted-average filter to restore them. The filter takes the nearest neighboring interpolated image as the initial image and computes the(More)
In this paper, we suggest a general model for the fixed-valued impulse noise and propose a two-stage method for high density noise suppression while preserving the image details. In the first stage, we apply an iterative impulse detector, exploiting the image entropy, to identify the corrupted pixels and then employ an Adaptive Iterative Mean filter to(More)
—Social media platforms provide an environment where people can freely engage in discussions. Unfortunately, they also enable several problems, such as online harassment. Recently, Google and Jigsaw started a project called Perspective, which uses machine learning to automatically detect toxic language. A demonstration website has been also launched, which(More)
The Advanced Metering Infrastructure (AMI) is a key component of future Smart Grids, which allows fine-grained and real-time monitoring of the energy consumption of private houses or entire buildings. In an AMI, intelligent devices, namely Smart Meters (SMs), communicate with a Utility Provider (UP) for both management and billing purposes. However, this(More)
In this paper, we propose a method for image block loss restoration based on the notion of sparse representation. We use the sparsity pattern as side information to efficiently restore block losses by iteratively imposing the constraints of spatial and transform domains on the corrupted image. Two novel features, including a pre-interpolation and a(More)
Wireless Sensor Networks (WSNs) have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. Recently, there is a great interest related to routing process in WSNs. Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have(More)
In this paper, we propose a blind signature scheme and three practical educed schemes based on elliptic curve discrete logarithm problem. The proposed schemes impart the GOST signature structure and utilize the inherent advantage of elliptic curve cryptosystems in terms of smaller key size and lower computational overhead to its counterpart public key(More)