The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present the CollaMine framework which aims to reduce the cost of data collection and data extraction. The framework consists of two keysolutions, namely, a collaborative system for web crawlers, and an automated regular expression diagnosis system for web content extractors. The empirical results show that the systems help to reduce the costs of data collection and extraction.
For a complex network, detecting the key links is of great importance. In recent years, many community detecting algorithms have been proposed, which have both advantages and disadvantages. In this paper, we propose and compare some classical community detecting algorithms and choose the best one of them to detect the key links of the complex network.
Data Mining is to pick up unknown, potential and useful information from vast, incomplete, noisy, vague and random data. Association Rules analysis is frequently used in data mining that analyze data and find the association or contact between things. This paper applies the Association Rules to the analysis of relationship between casualty and residential environment in earthquake. The data comes...
In this paper, we propose a new reversible data hiding scheme for images compressed by Block Truncation Coding (BTC). The original image is divided into n × n sized non-overlapping blocks and encoded by BTC to obtain the BTC-compressed bitstream. Each block is presented by a low mean value, a high mean value and a binary bitmap. The proposed scheme exploits the correlation among adjacent blocks and...
This paper presents a new approach for hiding information in digital audio based on the audio-to-image wavelet transform (A2IWT) and vector quantization (VQ). In our scheme, the cover audio signal is first transformed into an image by utilizing the wavelet transform and re-sampling the coefficients, then the secret data are embedded in the obtained image using a VQ-based image steganographic scheme,...
This paper, based on the forty-three indicators of animal physiology welfare, including environmental welfare, health welfare, mental welfare and behavioral welfare , totally five aspects as the subject, established the evaluation model of animal welfare management in zoos, and used triangular fuzzy number analytic hierarchy process to draw the weights of various evaluation factors, the results indicates...
Most H.264 watermarking schemes only embed the watermarks on I-frames, and are therefore extremely fragile under temporal attacks (e.g., frame dropping). To obtain the robustness under temporal attacks for H.264 watermarking systems, this paper presents a robust perceptual image hashing based temporal synchronization method. We extract robust geometric information from the 4times4 block mean map of...
In order to improve the communication quality in practical network coding system, three main strategies are proposed to protect the encoding vectors, which includes importing cyclical redundancy into the encoding vectors of the coded packets, executing distributed space-time code to the encoded packets and a shift between the above two modes above according to different signal-noise ratios. And then...
This paper presents a speech information-hiding scheme that is integrated with the CELP (Coded Exited Linear Prediction) speech coding method. The G.729 codec (CS-ACELP) is used to test the efficiency of this scheme. The index-constrained method is applied for the secret information embedding. The selected bits of first-stage and residual vector indices during the Predictive Two-stage Vector Quantization...
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, referring to Common Criteria (CC), we established security evaluation hierarchy model. Then, the analytic hierarchy process (AHP) method was used to calculate the security factors' weights...
For original paper see J. Shich, D.Lou and M. Chang, ibid., vol.28, p.428-440, (2006). In a recent paper, a robust water-marking approach for hiding grayscale image watermark into digital images based on SVD (singular value decomposition) is proposed by Shich et al. This comment demonstrates that the high robustness of the proposed scheme against various attacks is a result of improper algorithm design...
This paper proposes the design of a fuzzy controller by ant colony optimization (ACO) incorporated with fuzzy-Q learning, called ACO-FQ, with reinforcements. For a fuzzy controller, we list all candidate consequent control actions of each fuzzy rule. Each candidate in the consequent part of a rule is assigned with a corresponding Q-value. Searching for the best one among all combinations is partially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.