Current Issue : July - September Volume : 2021 Issue Number : 3 Articles : 5 Articles
Tourism is a major foreign exchange earner in Kenya contributing to 10% of the gross domestic product (GDP). Whereas Kenyan government strives to boost its GDP through improved arrivals, lack of effective tourism marketing strategies hinders growth in tourist arrivals in Kenya. To advertise and market the untold wealth of tourist destinations, the government utilizes campaigns through print and electronic media, which are expensive and limited in updating...............
Aiming at the problem that the robustness, visibility, and transparency of the existing visible watermarking technologies are difficult to achieve a balance, this paper proposes an adaptive embedding method for visible watermarking. Firstly, the salient region of the host image is detected based on superpixel detection. Secondly, the flat region with relatively low complexity is selected as the embedding region in the nonsalient region of the host image. Then, the watermarking strength is adaptively calculated by considering the gray distribution and image texture complexity of the embedding region. Finally, the visible watermark image is adaptively embedded into the host image with slight adjustment by just noticeable difference (JND) coefficient..............
Ideological and political education is the most important part of the daily education management of college students. The methods and methods of ideological and political education are very old, and students’ learning efficiency is very low. How to use ideological and political education technology combined with modern technology for teaching has become a current research hotspot. Based on this background, this article proposes to use a new type of Internet multimedia technology interactive teaching. In the ideological and political network multimedia teaching system, use occasions suitable for IP multicast applications, such as broadcast teaching, group discussions, and on-demand courseware. Among these functions, the IP multicast mechanism is appropriately used...............
In the process of learning and reasoning knowledge graph, the existing tensor decomposition technology only considers the direct relationship between entities in knowledge graph. However, it ignores the characteristics of the graph structure of knowledge graph. To solve this problem, a knowledge graph reasoning algorithm based on multihop relational paths learning (MHRPlearning) and tensor decomposition is proposed in this paper. Firstly, MHRP-learning is adopted to obtain the relationship path between entity pairs in the knowledge graph. Then, the tensor decomposition is performed to get a novel learning framework. Finally, experiments show that the proposed method achieves advanced results, and it is applicable to knowledge graph reasoning...............
Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic maps are commonly used in designing modern cryptographic applications, in which one-dimensional (1D) chaotic systems are widely used due to their simple design and low computational complexity. However, 1D chaotic maps suffer from different kinds of attacks because of their chaotic discontinuous ranges and small key-space. To own the benefits of 1D chaotic maps and avoid their drawbacks, the cascading of two integrated 1D chaotic systems has been utilized. In this paper, we report an image cryptosystem for data transfer in cloudbased smart cities using the cascading of Logistic-Chebyshev and Logistic-Sine maps. Logistic-Sine map has been utilized to permute the plain image, and Logistic-Chebyshev map has been used to substitute the permuted image, while the cascading of both integrated maps has been utilized in performing XOR procedure on the substituted image. The security analyses of the suggested approach prove that the encryption mechanism has good efficiency as well as lower encryption time compared with other related algorithms.............
Loading....