2021
DOI: 10.1007/978-981-33-6420-2_52
|View full text |Cite
|
Sign up to set email alerts
|

K-Means-Based Method for Identifying Characteristics of Wireless Terminal Equipment in Power System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The Proposed Cryptosystem: The encryption process of the proposed algorithm is divided into three parts. Firstly, the input image is multiplied with random phase mask, followed by DCT transform along with Arnold transform is applied and then key generation using Logistic map of chaotic maps [16].…”
Section: Fig 1 Logistic Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…The Proposed Cryptosystem: The encryption process of the proposed algorithm is divided into three parts. Firstly, the input image is multiplied with random phase mask, followed by DCT transform along with Arnold transform is applied and then key generation using Logistic map of chaotic maps [16].…”
Section: Fig 1 Logistic Mapmentioning
confidence: 99%
“…The peak signal to noise ratio (PSNR) serves as a barometer for similarity in visual perception. The more similar the image is to the decrypted image, the higher its PSNR value 16 .The formula of PSNR is shown in equation ( 15) (15) MSE: Measuring the average squared difference between anticipated and actual values in a dataset is done using the metric known as MSE or mean squared error 17. The formula of MSE is shown in equation 16. (16) SSIM: An indicator of the similarity of visual perception is the image similarity index (SSIM).…”
Section: Psnrmentioning
confidence: 99%