The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research mainly focuses on the household bean sprouts machines, putting forward a kind of intelligent photoelectric household bean sprouts machine, which is made up of the base, cover, cultivating cylinder, cultivating dish, pressure tray, pressure sensor, intelligent controller and control panel, etc. Considering that different beans need different illumination levels, this design uses the liquid...
In this paper, we present a novel recognition algorithm for detecting tongue cancer stem cells with respect to appropriate scaling factors. Our method can be achieved by computer image processing in the condition that the cancer cells are undifferentiated or slightly differentiated, which is of important research significance in the realm of oral medicine. According to the biological natures of tongue...
In this paper, we present a novel circle covering algorithm for the problem of locating repeaters when users in a certain area need to be covered. A fundamental issue is the circle covering problem, where "single-layer covering" equals "covered". However, single-layer is not applicable anymore for the covering of repeaters, because the service capacity of a single repeater is so...
In this paper, we present a novel multi-level design method to secure encryption algorithms against DPA attack. Generally, DPA-resistant methods can be mainly divided into two levels: software and hardware. Software-based countermeasures are relatively cheaper to put in place, while hardware-based methods counteract DPA at a lower level and achieve better countermeasure effectiveness. Taking both...
There have been serious concerns about hardware security from malicious modification of hardware design during design or manufacturing. Several hardware Trojan detection approaches have been proposed in past few years. In [1], Hicks et al. put forward a novel strategy named BlueChip to detect and nullify the hardware Trojans at design time. They also proposed a recovery mechanism in software layer...
In this paper, we present a novel technique for quickly generating large-scale digital watermarks. Generally, digital watermark can be embedded in any copyright image whose size is not larger than it. But nowadays, more and more high-resolution pictures call for larger and larger watermark templates, while most traditional watermarking algorithms work slowly on templates of large scale. To solve this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.