The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
The high frequency of the image pre-filtering and sampling can not be eliminated, whereby the power spectrum of the oscillation may cause aliasing, the sampling scheme proposed two standard blue noise pattern: step blue noise and single-peak blue noise, two blue noise sampling task performance in the image plane of the well, as can the other at least in the low frequency band sampling mode, and in...
In cloud storage, the data owner and data users can easily perform cooperative work on shared data. In this paper, we focus on operation behavior auditing in shared cloud storage, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination for the forensic investigation in shared cloud. We first introduce a novel secure public auditing model for...
Due to the lack of spectrum resource of power wireless private network, it is difficult to guarantee the transmission for the services in the distribution network. In order to enhance the network resource utilization, this paper puts forward a method for the uplink resource scheduling of power wireless private network based on NB-IoT and LTE hybrid transmission. Firstly, through the cognizing for...
Wi-Fi network packet capturing techniques are used to examine and capture real-time running packets, is a crucial step to analyze and evolve communication protocols. On most mobile phones based on Android system, FullMAC Wi-Fi chips are used in WLAN subsystem, and the secure digital input output (SDIO) interface is used between Wi-Fi chip and host driver. Most Wi-Fi capture tools are not suitable...
As mobile security, especially data security, is gaining more and more attention; most mobile phone users protect their data with encryption. At present, data can be effectively preserved through third-party encryption software and Google full disk encryption technology. The operation of the third-party encryption software is not convenient and requires manual encryption. Full disk encryption uses...
In order to overcome the limitations of a single view of action recognition by using multi-view information, this paper proposes a novel method of multi-view human action recognition. The main steps involved in the process of recognition of action features are represented by fuzzy vector quantization; the membership vector is obtained after the action feature fuzzy. A fast and efficient Extreme Learning...
In the Java web security field, the encryption and decryption code of the traditional Java source code protection scheme, which is based on custom class loader encryption, can be easily decompiled. This effect results in the leakage of the source code and the low efficiency of encryption and decryption. This study proposes a scheme based on the Java Native Interface (JNI) and the Advanced Encryption...
Traditional dehazing techniques, as a well-studied topic in image processing, are now widely used to eliminate the haze effects from individual images. However, even the state-of-the-art dehazing algorithms may not provide sufficient support to video analytics, as a crucial pre-processing step for video-based decision making systems (e.g., robot navigation), due to the limitations of these algorithms...
This paper presents rough set model under different granular computing, and compares the model under combined granular with that under single granular, also with rough set model under logical computing of granule. Results show that combination granule and logical computing of granule construct a chain, which will lay a foundation for knowledge acquisition based on information granule and induction...
The idea of decomposition is becoming increasingly successful and popular in evolutionary multi-objective optimization. An efficient cone decomposition approach was further developed in the conical area evolutionary algorithm (CAEA). This approach improves the runtime efficiency and population diversity of decomposition-based algorithms effectively for bi-objective optimization in practice. In this...
Based on the technology of radio frequency identification (RFID), combined with Internet and information processing technology, intelligent refrigerator for food management is developed, food records the within the refrigerator is achieved. These data will be automatically uploaded to the production of intelligent refrigerator cloud data service platform, easy to be viewed by the user. And according...
with the rapid development of science and technology, modern agriculture has made great progress. But frequent agricultural safety incidents have affected people's trust in agricultural production. These incidents (such as mad cow disease, avian flu) have seriously affected the situation of agricultural production in a region or product, and even affected the economic and social development. Based...
IoT(Internet of Things), with its enormous application potential, is highly valued by global governments and industries. The State Council of China said in 2009 that China should give priority to make breakthroughs in sensor networks and IoT key technique, constructing and developing IoT application. Today, IoT has been widely used in China industry. This paper introduces the IoT concept, expatiates...
The design of the system is based on ZigBee and the greenhouse environment is detected by a slave computer. The data collected will be transmitted to a host computer to do the specific operation. That is, by displaying and controlling greenhouse parameters in real time, the host computer can realize real-time monitoring and control of greenhouse temperature, humidity, light, air quality and other...
Software watermarking is a general tool usedto combat software piracy by embedding identifying informationinto a program. Most existing schemes of softwarewatermarking have the weak point that the security onlydepends on the stealth of the watermark structure. Besides,the watermarking is independent of program in semantic leveland can be destroyed via fairly straightforward semanticspreservingcode...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.