The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aiming at the invalidation of Dempster's rule for combining belief functions with high conflict, this paper proposes a new combination rule. Firstly, the limitation of classical conflict measure is pointed out, and improved measure for degree of conflict is presented and proved. Based on this improved measure, a new combination rule which is composed of three steps is proposed. The first step is to...
This paper proposed a method that using watermarking signal as the invariant descriptor, in order to locate the rotation, scale and translation that applied to the host image. The method uses the RST invariant Fourier-Mellin transform and Phase only symmetric matched filter as fundamental concept. It also presents the method that applies the watermark symbols at proper geometric locations which can...
A semi-fragile watermarking algorithm for copyright protection and content authentication is proposed in this paper. The features of the proposed algorithm are as follows: 1) The watermark depth can be adaptively adjusted according to local audio character, enhanced the robustness of digital audio watermark ; 2) The copyright protection and content authentication for digital audio can be utilized...
This paper proposes a transmit power and bit allocation algorithm with constraint on allocated bit number. Transmit power and bit allocation algorithms help improve performance of OFDM systems, however the existing algorithms can't fully satisfy the need of baseband data modulation methods, which only map a certain number of input bits into a data symbol. The presented approach aims at maximization...
Time-frequency distribution (TFD) method has received a considerable amount of attention in Direction of Arrival (DOA) estimation of multi-senor and time space processing, which lead to improved spatial resolution and source separation performances. According to the characteristic of the different time-frequency distribution of each source, a novel approach of time-frequency DOA estimation is provided...
Image denoising is an important step in image processing. In this paper, a new image restoration approach based on the index set of significant Curvelet coefficients constrains is proposed. Firstly, the noisy image is processed by Curvelet thresholding method, at the same time, the index set is preserved by the curvelet coefficients whose absolute magnitude is more than the thresholding value. Secondly,...
Based on the sharp-peak and heavy-tail of statistical distribution of discrete cosine transform (DCT) coefficients for audio, generalized Gaussian distribution (GGD) and alpha-stable distribution are usually employed as modeling tools. In this paper, the Kullback-Leibler Divergence is applied to measure the difference between modeling result and the true distribution, and the experiment results show...
Interval temporal logic (ITL) model checking reduces the false negative rate of misuse detection for concurrent attacks. However, no ITL formula can be used to describe the time constraints between various actions in the same attack. To this end, we use a timed interval temporal logic (TITL) formula to describe such constraints as well as the absolute time of atomic steps in an attack. On this basis,...
As a kind of computationally efficient maximum likelihood detection (MLD) algorithm, sphere decoding algorithm (SDA) has been widely studied in Multiple Input Multiple Output (MIMO) systems. The traditional SDA only applies to the MIMO systems that the number of the transmit antennas is equal to or less than the number of the receive antennas. This paper proposed an improved SDA, which can be applied...
In this paper, distributed data fusion for satellite passive localization is examined. The traditional single or multiple satellite passive localization systems usually use a fixed localization mode which commonly has poor fault tolerance capability. We investigate a distributed passive localization scheme using angle only measurements from multiple satellites. However, recursive fusion algorithms...
This paper addresses the scheduling problem for multiuser multi-input multi-output (MU-MIMO) system based on Tomlinson-Harashima Precoding (THP). By considering the channel gain and channel correlation jointly, a low-complexity multiuser scheduling approach is proposed. Compared with the existing scheduling schemes, the proposed scheme can avoid complicated searching process, and thus reduce the scheduling...
When collecting image from imaging system, the image we collect are blur and the information missed because of the collecting processes. The algorithm based on wavelet analysis which we have introduced does not need any transcendental information of the image, and does not depend on the image size to estimate the de-nosing limits, and even does not need the information of square difference, has the...
If a computing service is composed by several runtime tasks among which dependence relationships exist, the structure of the class 2 of Petri Net can be used to describe the dependence relationships and how much data is depended among runtime tasks; it can be regarded as a model for discovery of parallelism. By determining computing service, constructing Petri Net, calculating the waiting time priority...
In recent years, the spread of spam comments has become a main obstacle which limits the development of commercialized social networks. This paper analyzes the differences of behavioral characteristics between normal users and malicious users. Based on these characteristics, we propose several heuristic methods to detect spam comments. These methods evaluate comments from three perspectives, including...
Harn and Ren proposed an efficient identity based RSA multi-signature scheme published in Journal of Computers and Security. Their scheme is claimed to be the first scheme with both fixed length and verification time. However, we find a flaw in their scheme that potentially allowing an adversary to forge a multi-signature of any group of other users. We gave an improvement of the scheme, and proved...
Recently, a new block encryption system has been proposed based on iterating a logistic map. This paper studies the security of the new encryption scheme and reports the following findings: (1) the sub-keys of any ciphertext can be obtained by using only two chosen ciphertexts; (2) the underlying chaotic key stream sequence can be reconstructed as an equivalent key by some chosen plaintext and ciphertext...
The homogeneity and the heterogeneity among peers in P2P networks can be utilized to counter P2P worms. The heterogeneity among peers can slow down the spread of worms, and the homogeneity can make the corresponding alert propagate faster than a worm. The distance between peers is defined to represent the heterogeneity. We proposed a worm containment scheme based on double-neighbor lists in P2P overlay...
Due to the serious condition of safety production in hydropower construction project on the whole, it is an urgent need to evaluate hydropower engineering construction safety. But the problem of the mapping relationship between evaluation index and accidents, fixed and variable weight, randomness and fuzziness and so on, can't be solved through the traditional safety evaluation method for hydraulic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.