The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Monkey, a random testing tool from Google, has been popularly used in industrial practices for automatic test input generation for Android due to its applicability to a variety of application settings, e.g., ease of use and compatibility with different Android platforms. Recently, Monkey has been under the spotlight of the research community: recent studies found out that none of the studied tools...
We present nonasymptotic achievability and converse bounds on the maximum coding rate (for a fixed average error probability and a fixed average blocklength) of variable-length full-feedback (VLF) and variable-length stop-feedback (VLSF) codes operating over a binary erasure channel (BEC). For the VLF setup, the achievability bound relies on a scheme that maps each message onto a variable-length Huffman...
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of processing large amounts of data to be used directly embedded devices, however, because their resources are extremely limited. So this idea had to be abandoned, only use embedded database...
Currently, most of the human detection methods are based on low-level features. In this paper, we proposed a middle-level feature generation method based on non-negative matrix factorization (NMF) for human detection. We also proposed an improvement scheme to guarantee that a better middle-level feature can be achieved. The proposed scheme can be applied to a complex background and the experimental...
There exist corresponding relationships of state information between the suspension points of the maglev train. This essay carries on the statistics of monitoring data of all the suspension points, describes the distributed situation of the suspension points data frequently spotted in engineering practices, detects suspect values and abnormal values in the suspension system based on the steady estimator...
Accurate segmentation of the prostate in computed tomography (CT) images is very important in image-guided radiotherapy. In the current study, an automatic framework is proposed for prostate segmentation in CT images: first, we propose a novel image feature extraction method, namely, variant scale patch, which can provide rich image information in a low dimensional feature space; second, we take the...
A new approach to obtain real-time positions of fiducial markers in MV treatment beam images is proposed. The MV images are firstly preprocessed to enhance contrast in the treatment field. To deal with large variations in projected marker shape, we propose a learning-based approach to detect marker locations in the enhanced MV images. We also show that marker tracking can be accomplished much more...
This paper proposes a simple yet effective method to learn the hierarchical object shape model consisting of local contour fragments, which represents a category of shapes in the form of an And-Or tree. This model extends the traditional hierarchical tree structures by introducing the “switch” variables (i.e. the or-nodes) that explicitly specify production rules to capture shape variations. We thus...
In order to precisely test attitudes of rolling projectiles by using inertial measurement system, a novel method of half-strap down inertial measurement is proposed in this paper. Its key thought is to make inertial measurement system not rotate with rolling projectiles, and keep its longitudinal axis accordance with the longitudinal axis of rolling projectile by using a special half-strap down structure...
Since the use of advanced composite materials continues to increase in the area of aviation and navigation, the need for a quantitative, rapid, in-service inspection technology has become a critical concern throughout the industry and practice. Thermal Wave Nondestructive Testing (TW-NDT) technology, which has proved to be an effective method, was used to detect defects in composite materials of missile...
Translation-based steganography (TBS) is a kind of famous text steganography. In this paper, we examine the robustness of TBS and give an effective detection algorithm for TBS. Our algorithm can not only distinguish between natural language text and stego-text which was generated by TBS, but also can distinguish between machine translated text and stego-text. The detection accuracy increases as the...
Steganography is a technique for embedding secret messages into carriers. Linguistic steganography is a branch of text steganography. Research on attacking methods against linguistic steganography plays an important role in information security (IS) area. In this paper, a linguistic steganography detecting algorithm using statistical language model (SLM) is presented. An experiment to detect text...
Linguistic steganography is a technique for hiding information into text carriers. Most of the previous work on linguistic steganography was focused on steganography and there were few researches on steganalysis. Research on attacking methods against linguistic steganography plays an important role in information security (IS) area. In this paper, a linguistic steganography detection algorithm based...
Text-steganography plays an increasingly significant role in covert-communication on Internet. Compared with study on text-steganography, research on text-steganalysis is in its infancy. In this paper, we present a statistical analysis of a kind of word-shift text-steganography by using neighbor difference (length difference of two consecutive spaces). We classify nature PDF documents into two cases...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.