Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Soft computing in the area of information security is a promising field for the creation of intelligent solutions. This paper discusses a method for digital watermarking using artificial neural networks to realize secure copyright protection of visual information without any damage. The discussed watermark extraction keys and feature extraction keys identify the secure and unique hidden patterns for...
Recently, various types of robots have been researched and developed for supporting our life. Also, the perceptual system for the robot is researched. Visual perception includes a lot of valuable information and it is useful for all intelligent robot system. In this paper, we discuss intelligent robot vision in order to detect multiple object and human. There are many visual sensors and we use the...
Japanese text is composed from three kinds of characters that are "Hiragana", "Katakana", and "Chinese character". This chapter is explained about these three kinds of characters necessary for writing Japanese. Children of lower grade have little knowledge on "Kanji".Therefore, they can't enough read and write "Kanji". However, applications like Web...
Graph colorability, COL, is a typical constraint satisfaction problem to which phase transition phenomena,PTs, are important in the computational complexity of combinatorial search algorithms. PTs are significant and subtle because, in the PT region, extraordinarily hard problem instances are found, which may require exponential-order computational time to solve. To clarify PT mechanism, many studies...
In a deregulated electric power industry where electric power export and import among interconnected areas are frequent, transmission network plays an even more significant role in allowing inter-area transfers. In order to maintain secure power transfers, security limit such as transient stability constraint has been imposed to power transfer, hence allowing secure power transfer for a possible contingency...
Digital watermarking became a key technology for protecting copyrights. In this paper, we propose a method of key generation scheme for static visual digital watermarking by using machine learning technology, neural network as its exemplary approach for machine learning method. The proposed method is to provide intelligent mobile collaboration with secure data transactions using machine learning approaches,...
This research examined the effect of different odors and different types of breathing on the recovery period after moderate exercise on bicycle. The subjects were nine healthy college students (male). The experiment was divided into three periods. The first was the baseline period of six minutes during which the students remained seated. During the second period the students exercised for twelve minutes...
As compared with parallel converters employing buck converters or boost converters, the analysis of multiple-input parallel switched-capacitor (SC) DC-DC converters is not sufficient. In this paper, a multiple-input parallel DC-DC converter designed by using SC techniques is proposed for mobile back-lighting applications, and handy theoretical formulas are given concerning the power efficiency and...
In this paper, we present a computing theory and its analysis for collaborative and transparent decision making under temporary constraint, i.e., cost of time pressure which decision makers face in negotiation. We have formulated the proposed computing theory based on game theory and information economics, and checked its feasibility in its applications to a case study. A general heuristics tells...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.