The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stable dispersion of antimony-doped tin oxide nano-powder was prepared by wet attrition process by comminuting aggregated ATO nano-powder using the titanate coupling agent as a dispersant to form the chemisorbed layer on the particle surface. The feed solution of the ATO dispersion and PVP was prepared for electro-spun fibers on the glass substrate. The surface resistance of the fibrous ATO film after...
In light of the rapid growth VoD clips commerce services, there are more needs video and scene metadata to be searchable and re-usable. We propose a design of scene knowledge base system based on a domain knowledge ontology. The domain knowledge ontology is knowledge base to describe some scenes which who, when, where, what and how. It has actors, objects, times, locations, activities, moods, brands,...
Scene boundary detection is a well-known task in both computer vision and machine learning. Due to the different characteristics of scene boundaries according to applied aspects, scene boundary detection can be casted into an unsupervised learning with multi-view data. This paper suggested the scene boundary detection method which adopts several ways to handle information in multi-view data. More...
Currently, to create an interactive media provided multimodal interface, an expert shoots scenes based on scenario, and then edits scenes using special program. In the market, the technology that user can easily create an interactive media by reusing video contents is required. In this paper, we propose the method for creating an interactive media by only user input scenario.
The only solution against zero day attack is the anomaly based detection independent of specific signatures. The basic mechanism in the anomaly detection approach is establishing a profile to describe the “normal” situation of a network or machine. If this profile was accurate enough, all attacks should be detected because they are “abnormal” to the profile. Until now, there has no effective method...
Network processors in general, enable us to add, through software, the latest-and-greatest network services while maintaining high packet throughput and low packet latency. Simply put, the network processors offer performance and flexibility for implementing network services. IPSec is a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. This paper describes...
Network processors in general, enable us to add, through software, the latest-and-greatest network services while maintaining high packet throughput and low packet latency. Simply put, the network processors offer performance and flexibility for implementing network service. IPSec is a set of protocols developed by the IETF to support secures exchange of packets at the IP layer. This paper describes...
IPsec protocol has been widely deployed at remote business environment because of its properties, confidentiality and integrity for network traffic. Before using IPsec protocol, it is needed that negotiations of security associations and keys between two end points of IPsec tunnel. IKE protocol is used when negotiation is done automatically. This paper introduces the light-weight IKE protocol that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.