The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collision is a very universal phenomenon of physics. Given the elastro-plastic sphere model, based on Hertz contact theory, by introducing the material hardening coefficient in to be closer to the reality, the collision process of two elastro-plastic spheres is discussed in the paper, and the corresponding computer simulation software is developed. Then, on basis of the simulation we discuss the influence...
Radiated noise curve is analyzed in this paper. Radiated noise area can't be covered by acoustic homing torpedo search section in the situation of great angle of attack or small angle of attack. In order to solve this problem, it is pointed out that the ballistic of acoustic homing torpedo should base on two turnings salvo.
In this paper, Radio Frequency Identification based Tracking Systems for securing transit goods under customs control in East Africa are discussed. Challenges experienced in the port and shortcomings of manual based tracking systems necessitated Kenya Revenue Authority to explore use of modern methods to track transit cargo. Two systems one based on Relevant Time System and the other on Real Time...
Recently with rapid development of broadband network and IT technology, consumers are capable of wirelessly connecting to the internet through Access Point (AP) or 3G to conveniently browse the Internet or even receive a digital multimedia. The advancing of this technology is providing consumer with an easy access to Internet anywhere to receive services. One of the services that is attracting user...
There are increasingly more and more highway tunnels in China. The factors to safe tunnel operation include ventilation, lighting, fire, weather and car flow in traffic. This design will focus mainly on two major factors: ventilation and lighting. Design work as stated in this document will be carried out stringently following national and industrial specifications. Best ways of ventilation and lighting...
Mobile phones are widely used for several purposes by great variety of users from different profiles. Advances in the technology and market competition result additional features to mobile phones. Manufacturers put multiple functions to a single device which could add mental load and complexity to the users. Most of the mobile phone functions are never used. Another problem on the mobile phone menus...
Sabina vulgaris, a clonal growth of plants, has distinguished advantage in anti- drought, but many past works were more focused on its eco-physiological characteristics, clonal growth modeling almost never explored. In this work, a clonal growth model of S. vulgaris shrubs is discussed based on improved dual-scale automaton model with the data from experiments. The model can calculate the position...
The objective of the paper is to propose a privacy model for ubiquitous healthcare system involving unconventional information sources like laboratory scanning equipments, networked computing systems and distributed wireless sensors using an actor based domain specific approach. In the existing privacy models for ubiquitous healthcare systems the trust on the middleware and the deployed security mechanisms...
A novel reversible watermarking scheme based on 2-D Lifting wavelet transform, LWT2, integer transform and block linking method is presented in the paper. LWT2 produces coefficient subbands whose values are in integer form. The integer transform is then applied for embedding watermark bits. In addition, the simple and fast block linking method is used for indicating the embedding location. Experimental...
Time-shifting is expected to be a popular core feature of IPTV systems because of its ability to enable users to personalize their TV channels. Here we propose a quality affordable IPTV time-shifting solution to what is often the most demanding situations: the combination of the limited power of end-user equipments and highly interactive users on a dedicated close network. Extensive empirical evaluations...
The ceramic tile manufacturing process is completely automated with the exception of visual inspection of the product (sorting stage). There are a number of methods for the automatic detection of multifarious range of ceramic tile defects and automatic sorting of them. In these methods it is necessary a tradeoff between sorting accuracy and the rate of computation. In this paper we propose a system...
This paper briefly analyzes the current research on E-government system assessment methods, and suggests that realizing automatic detection is the trend of establishing appraisal index system due to an increasing number of humanized services provided. Based on the performance evaluation of government websites in recent years, the factors that influence the construction level of local government websites...
We propose a novel topology based data hiding scheme for binary image. Cutting the original image into equal blocks, and considering the topological structure for the chosen embeddable blocks with almost balanced number of white pixels and black pixels, we set a mapping between the embeddable blocks hiding before and after. We embed one bit via the odd-even enforcement in each embeddable block, and...
Project-based Learning, widely used in higher education as well as in elementary schools and middle schools in China recent years, seems to be one of the most effective methods for teaching and it is believed that students can develop kinds of skills especially the social skills by encouraging collaborative work amongst students. Nevertheless, the value of this approach is limited to the way it is...
A robust and geometric invariant digital watermarking scheme for gray-level images is proposed in this paper. The scheme carries out watermark embedding and extraction based on histogram in DWT domain. For watermark embedding, the original image is decomposed into the approximation and details sub-bands. Pixels of the approximation sub-band are grouped into m blocks, each of which has the same number...
E-commerce personalized recommendation technology uses e-commerce website targeted to different customers with the purchase proposal. According to the network the purchase process, design expert system consultation subsystem, database subsystem and results of the subsystems, design the form of recommended rules and recommendations, using heuristic search to improve recommended rate.
In this paper a new image encryption system based on replacement of pixels values by using 2D Memorized Cellular Automata and chaos mapping is proposed. Cellular Automata rules are defined based on chaos mapping and stored in private key. Proposed system have some advantages such as confusion, diffusion, symmetric private key, very large number of secret keys, key-dependent pixel value replacement...
This paper is concerned with the Improving Space Time Diversity In a Fixed Point-to-Point link Using LMS Based Interference Cancellers, carrying SDH signals with 30 MHz channel spacing. A system model is presented based on a proposal to achieve higher spectral efficiency and data rates. Signals are modulated with 8 QAM & with 64 schemes, and Reed Solomon codes are used for error control coding...
Watermarking techniques have been proposed to solve the problem of copyright protection and authentication of digital media. In this paper, a robust blind lossless watermarking scheme is proposed that is based on similarity between DCT coefficients of original image and watermark. The watermark extraction procedure does not require the original image and extracts the watermark by using the secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.