Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The rapid development of Internet attack has posed severe threats to information security. Therefore, it's of great interest to both the Internet security companies and researchers to develop novel methods which are capable of protecting users against new threats. However, the sources of these network attack varies. Existing malware detectors and intrusion detectors mostly treat the web logs separately...
Recent years, online social networks (OSNs) are facing increasingly serious Sybil attack, which results in unexpected terrible impacts on social network services with illegal behaviors as manipulating online votes, publishing large amount of annoying advertises, etc. To detect Sybil account among ordinary users, several attributes and behavioral characteristics based detection algorithms were proposed,...
Security issues of text watermarking are greatly different from those of other multimedia watermarking, in terms of its specific requirements and characteristics of text watermarking. The security theory of text watermarking is proposed in this paper, and the following security topics are discussed: (i) the classification and application of text watermarking; (ii) the classification and analysis of...
In this paper, an improved clustering algorithm based Ant-Tree is used for recognition of certain kind of architectural symbols with prior knowledge in engineering drawings. Symbols are segmented from an AutoCAD format drawing and a vector of invariants based on pseudo-Zernike moments is calculated to represent the graphical feature of a symbol. A normalization method is used to make these moments...
In this paper, a multi-texture-model for water extraction based on remote sensing imagery is proposed. The model is applied to extract inland water (including wide river, lake and reservoir) from high-resolution panchromatic images. Firstly directional variance is used to find river regions, and then grain table is adopted to avoid noise including objects that have similar directional variance characteristic...
In this paper, a complete procedure is proposed to analyze and classify the texture of an image based Bayesian network classifiers. We apply this procedure in the residential areas detection. A simple case of Bayesian network called naive Bayes classifier is used to learn the positive and negative samples and to infer about the unknown regions. In this paper, each texture feature vector is labeled...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.