The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Coal or rock electromagnetic emission analysis is a promising method for predicting coal or rock dynamic disasters. Hidden Markov Model (HMM) is applied to this problem in this paper. HMM model is a processing method of dynamic information based on probability, which can reflect both randomicity and potential structure of the object. Model selecting of HMM Bayes Information Criterion is combined with...
In this paper, we propose a new data hiding method. We divide cover-image into many non-overlapping blocks. Each block consists of two contiguous pixels. We separate the secret data into two parts. These two parts of secret data are hidden into two pixels of the block. The hiding capacity is depended on the difference value of the two points. If the difference value is higher, we embed more bits of...
In 2010, Chen et al. proposed a data hiding scheme with high payload and good visual quality. The edge information is detected and most of the secret bits are embedded into the edge area. An index pixel is chosen to record the edge information for each block. However, the embedding space will decrease because of the index pixel. Thus, we proposed a data hiding that enhances the visual quality based...
Community mining has been the focus of many recent efforts on complex networks, and the genetic algorithm with low time-complexity is widely used in this discipline. To enhance the performance of genetic algorithm for community detection, the modified crossover operators which are more suitable for community detection is proposed in this paper, and the heuristic mutation operator based on local modularity...
RFID is being gradually adopted and deployed in a wide area of applications and it generates massive RFID data. The purpose of the RFID event processing is to extract valuable information from the real-time and large volume RFID data. In this paper, we divide RFID event into RFID Simple Event and RFID Complex Event and apply different algorithms to process them because of their different characteristics...
The increasing volume of spam has become a serious threat not only to the Internet, but also to the society. However, it's a great challenge to discover the spam from the Internet effectively and efficiently. Content-based filtering is one of the mainstream methods to solve the problem. This paper proposed a content based spam topic detection strategy through keyword extraction. In particular, spam...
Multiword expressions (MWEs) are important for practical applications, such as machine translation (henceforth, MT), multilingual information retrieval, data mining and other natural language processing. A method of combining similarity measure and statistical tool is proposed for automatically extracting English MWEs from the corpus of Chinese government white papers and work reports from 1991 to...
To solve the security problem of multi-media, data hiding is one of important technologies. Loss less data hiding is a special type of data hiding technologies with the characteristic of completely recovering the cover media after the embedded data are extracted. Recently, many reversible data hiding methods have been proposed for VQ-compressed images. Lu et al. proposed a VQ reversible data hiding...
Through research on the calculation method of feature words' weight in texts and semantic similarity between words, we proposed a calculation method of feature words' weight based on concept weight for the semantic association phenomenon of text features and the prevalence of high-dimensional problem in a text vector space model. This method reduces the semantic loss of the feature set and the dimension...
The gas outburst forecasts model is brought forward in this paper. Firstly, rough set requires discrimination data, considering distributed information of class, and continual condition attributes are discredited adopting information entropy theory. On the basis of that, redundancy attributes are eliminated using rough set reduction algorithm. Reduction attributes and rules are gained. Finally, through...
This article base on more than 130 cloudless satellite imagery since 1983, and Poyang Lake water level data from hydrological site since 1993, computed analysis of Poyang Lake water area, established the remote sensing calculation model with Poyang area, demonstration of Poyang Lake area be increased at the same time with water level by XingZi station, and There are significant seasonal variations,...
Most existing semi-supervised methods implemented either the cluster assumption or the manifold assumption. The performance will degrade if the assumption was not proper for the data. A method was proposed by combining both the cluster assumption and the manifold assumption. A semi-supervised kernel which reflected geometric information of the samples was constructed through warping the Reproducing...
The following topics are dealt with: particle swam optimization; evolutionary computation; case based reasoning; language processing, pattern classification; data mining; optimization; intelligence control; robotization; ubiquitous network; pervasive network; information system; network management; steganography; watermarking; image processing and network control.
This paper presents a systematic design of an efficient cloud framework for wellness self-management devices and services. The innovative wellness self-management devices and services performs the following functions: (1) Collecting GPS, accelerometer, temperature, image data and personal profiles, (2) Fusing data and recognizing the state, (3) Performing predictive constantly analytics on the sequence...
In the daily life, secret data delivery is an important application for privately communicated to each other over computer networks. Data hiding technique is a good way to achieve the secret data delivery, thus the color image is a popular cover media used to send the secret. Block truncation coding (BTC) is a lossy image compression technique, which can significantly reduce the size of image. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.