The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web page information hiding technology takes the web page as covered channels to transmit the secret information. In this paper, an algorithm of web page information hiding technology based on the tag dictionary is proposed according to the web page structure characteristics. This algorithm uses the method of multiple tags combination to increase the web page information hiding capacity by 2.5 times,...
As multi-antenna being used in MIMO system to transmit signals with the same carrier frequency, one physical channel in MIMO will contain multi-virtual independent Rayleigh fading channels (VIRFC), among which very small relative time delay is existed, so the definition for the independent Rayleigh fading channel (IRFC) in MIMO theory is wrong. Also it is proved in the paper that joint receiver used...
This paper introduces a system that uses ARM as the main controller and double gateway in a control computer within a car. This system makes full use of the high-performance of ARM, high-speed reduction of CAN bus communication control networks and instrument control so as to achieve full sharing of data between nodes and enhance their collaborative work. This system features efficient data transfer...
In this paper, we present on the research of semantic-based 3D model retrieval system and its developed framework. We use RDF annotation to label 3D models for improving retrieval precision. The framework contains three parts: preprocessing, feature extraction and similarity measurement. The parts are recommended to analyze the 3D model. In the preprocessing part, we deploy PCA to make models normalization...
The scalability of future high performance computing (HPC) systems are challenged by high failure rates. So fault tolerance technique will play a more important role in future HPC field. Currently, the checkpoint-restart technique is the main fault tolerance technique. However, the checkpoint-restart approach results in a very high overhead, which influences the efficiency of HPC systems seriously...
Base on the large amounts of data accumulated in educational Administration system lacking intelligent data analysis tools, decision tree analysis model of student achievement was built by using decision tree algorithms in data mining, the model had been optimized by using after pruning algorithm, and classification rules had been generated, it provided basis of decision making for educational reform...
The paper analyzed the characteristics of Java programming course. It analyzed the problems in the practical teaching of Java programming course. This paper presents several java curriculum reform ideas, tools and methods to stimulate the students' interest in learning, improve practical skills. The purpose of this paper is to develop rigorous logical thinking ability and creative ability, and to...
This article based on the actual university library business needs, using association rules to mining analysis universities Library students borrow data. First the library history borrowing data pretreatment, including data cleaning, data integration, data transformation and transaction database construction, Then the association rules mining algorithm MFP-Miner algorithm is applied to the transaction...
In this paper, particle filter theory and its Application in blind equalization are presented. The basic idea of particle filter is the recursive computation of relevant probability distributions using discrete random measures composed of the particles and its weights. Compared with the other methods for equalization, the advantage of particle filtering is in that exploited approximation doesn't involve...
At present, various Hospital Information Systems (HISs) are paid more and more attention from both hospitals and software industry. Hospital medicine storage information system is an important element of HIS. The system is mainly consisted of six modules, namely medicine storage initialization, medicine storage management, medicine entry management, medicine delivery management, medicine wastage management,...
In this paper, a novel evolutionary algorithm is proposed for solving route planning problems. Firstly, the route planning attributes were analyzed in detail. Secondly, the constraint expressions, evaluation function, and genetic algorithm were presented. Finally, a numerical example described in this paper shows that the genetic algorithm can generate routes very quickly and can efficiently produce...
Maintaining route planning is a problem belonging to queuing theory. Firstly, PSO was introduced to the research of maintenance route planning. Secondly, constrains and the penalty functions were established based on the characters of the maintenances, and the procedure was presented. Finally, the numerical example was given out. The result shows the proposed algorithm yields faster convergence speed,...
The three-dimensional temperature field of the coal-bed methane with heat injection was numerically calculated by ANSYS. The calculated results revealed that the temperature, the thermal gradients and the thermal flux vector sum of the coal-bed near the injection well was higher, while was smaller at the other area of Coal-bed Methane (CBM), which indicated that the coal-rock was not affected by heat...
Synchronous data triggered architecture (SDTA) is advantaged with high-performance, flexible scalability, low-cost communication between processor elements. With the prevalence of multimedia nowadays, it is significant to parallelize and optimize the implementation of OpenMAX DL's video component with SDTA support. H.264 is the core of the video part. In this paper, we propose several optimization...
Frequent Closed Item set mining on data streams is of great significance. Though a minimum support threshold is assumed to be available in classical mining, it is hard to determine it in data streams. Hence, it is more reasonable to ask users to set a bound on the result size. Therefore, a real-time single-pass algorithm, called Top-k frequent closed item sets and a new way of updating the minimum...
Digital watermarking, the technology of embedding special information into multimedia data, is a topic that has recently gained increasing attention all over the world. The watermark of digital images, audio, video, and other media products in general has been proposed for resolving copyright ownership and verifying the integrity of content. The paper first introduced the definition and basic framework...
With the rapid development of mobile communication technology, the continued expansion of multimedia applications, and the multi-mode multi-band requirements of global communications, the cost and the size of mobile phone design have become an important research. This paper gives the current mainstream schemes to realize WCDMA and GSM dual-mode phone frequency radio architecture with single-pole nine-throw...
In this paper, we propose a novel active contour model for image segmentation integrating the local and global intensity information into the geodesic model. A signed pressure forces function based on the statistical information of gray intensity is used to replace the edge stopping function in the traditional geodesic model. The minimization of the energy of contour is implemented by level set method...
The well-known Merkle-Damgård construction could not preserve all of the properties of the compression function, such as the second preimage resistance property, pseudo random property etc. To improve the security of the iterative Hash function, an enhanced iterative construction was proposed. Using the known attack methods, the security of the new construction has been considered. The results are...
Test data generation is a key part in software test area and it is of significance to realize the automation of software testing. The main contribution of this paper lies in that a practical model, which utilizes genetic algorithms as searching policy to generate software structural test data, is proposed. To achieve higher performance, such issues as encoding strategy, algorithms operator evolution,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.