The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the sharing features of a variety of license plates (LP), the vertical edge was first detected by Sobel edge detector. Then, some approaches were adopted to remove the invalid edge regarding the characteristics of edge grayscale jump and edge density, so that the regions having features of LP were preserved. Next, by horizontal and vertical projections and mathematical morphology (MM) operation,...
The statistical information reconstruction of images will be difficult and inaccurate when no conditional data or only hard data are available. Accuracy of reconstructed images can be improved, using soft data during the process of reconstruction. Integrating soft data with hard data, a method based on multiple-point geostatistics is proposed to reconstruct statistical information of images. During...
P2P together with media streaming technology brings a new method for video service. This paper proposes a design to deploy video service on commercial systems with authentication servers. The design combines C/S charging model, and provides video contents in a P2P way. According to the address information registered on authentication servers, a media management server helps new peers to find their...
Currently, surgery is the most effective and common way to treat cataract, one of the leading causes for blindness worldwide. Of all surgical methods, phacoemulsifieation is the most popular. During the operation, surgeons have to evaluate the hardness degree of the cataractous lens by themselves. To make the evaluation intelligent, a machine-aided classification method for cataractous lens is proposed...
The terminal design of a data acquisition system based on GPRS is designed in this paper. It works out the hardware design of GPRS terminal equipment, including the minimum system design based on the Samsung ARM7-core microcontroller S3C44B0X, and the hardware design adding the GPRS engine MC35i produced by Siemens and RS485 interface to the minimum system. According to dial-up procedure, describes...
Cache is important for the performance of processor. With the multi-core developed, cache architecture for the performance of multi-core processor has begun to emerge. Through the result of running a test program for parallel computing obtains the phenomenon, this article analyses the reason of it occurred. It summarizes that the L2 cache architecture has an impact the performance of multi-core processor...
Aiming at the limitation of the fuzzy neural network method for image enhancement presented by Dr. Russo, whose parameter was fixed and not flexible, a novel method of adaptive parameter selection was proposed in this paper. By calculating the difference between the gray value of each pixel and the median of its neighborhood, select adaptively smooth and sharp parameters. Compared with the method...
As the core link of off-line reverse analysis, data collecting can be regarded as decryption of encrypted synchronous sequential machine, the key part of which is driving itself from decrypted state to encrypted state by building state transition diagram and using corresponding search strategy. Based on diffusion mechanism, weighted state transition diagram is built, on which single-branch search...
The new method of active fortify organizing a supervised area based on color and geometric feature is proposed in this paper. By the basis of color feature in the real supervised scene, in the first instance extracting several regions of interest (ROI) with noise, then matching with geometric shape by Fourier descriptors in the database, sequentially achieving automatic organizing a supervised area...
This article puts forward a method to access the data and analyzed results from the monitoring system of environment based on WSN with the B/S mode. It resolves the problem of low speed of page refresh with Ajax. The experiment shows that the partial refresh feature of Ajax can make it possible for the users to get access to the data and analyzed results easily through the browser, and experience...
Protecting data of free-roaming mobile agents has drawn much attention in recent years. But no perfect solution has ever been proposed. Many of the solutions are vulnerable by colluded truncation attacks. In this study we analyze available methods, and design a novel protocol by cooperation between two kinds of agents -Task Agent and ACK Agent. Task Agent moves freely in the net to complete some task...
Watermark is a new effective digital copyright protection method and data security technology. A new scheme of image retrieval based upon digital watermarking has been proposed. First, embeds the binary watermark information in carried image, computes the value of NC (normalized correlation coefficient) between query watermark and extracted watermark,and gains the retrieval results. The watermarking...
Recording execution traces is emerging as a promising approach to overcome many of the obstacles in software debugging. Facing the shortages of current technologies in recording program execution traces, we present an instruction-level recording platform in Windows, which enables user to record instruction and data flows of program dynamically with full fidelity. The platform is embedded in the flexible...
Parallel computing is important in modern technology, so is the interconnected network. This paper analyses the architecture of SMP symmetrical multi-processor system, designs a kind of crossbar for small scale multi-processor system basing on the theory of advanced computer architecture. Brings forward the concept of require priority and designs a scheduling algorithm in considering of the priority...
Many proposed solutions employ distributed depth-first-searching (DFS) approach to implement positioning in application layer multicast. In DFS-based delivery tree building approaches, the newcomer need not know the information of other members except the root, and positioning can be easily implemented. However, the DFS approach cannot effectively position a host in some cases because it usually selects...
The Multi Expression Programming (MEP) and Neural Network (NN) is applied to the crack fault diagnosis of structure. The inherent frequency and the position of the crack obtained by ANSYS are used as parameters of the neural network. This approach employs MEP to evolve the architecture and the parameters encoded in the NN. This framework allows input variables selection, over-layer connections for...
The emergence of search engines set off an unprecedented storm of information. In recent years, a new breakthrough - vertical search, emerged on the basis of the general search engines, compared with the general search engines, it must be conducted on the pre-analysis. A successful vertical search engine must be based on the accurate extraction of a wide variety of Web information. However, unstable...
Concept lattice was creatively used in mining correlated policy rules in this study. It takes much time for a conflict detection routine to search every policy in policy repository with conventional policy storage models to see if conflict occurs before a new dynamic policy is added to the policy repository. A novel storage model for dynamic policies was proposed to address this problem. Dynamic policies...
In order to make full use of resources in distributed parallel computing system, and reduce general time cost for performing the algorithm, task scheduling and resource management model and low-layer resource supervision-control model are designed and implemented. The unpredictable system behavior is resolved, which is caused by dynamic change resources. The dynamic join-in of resources is allowed...
For developing a surgical simulation platform that not only accords with software design standards but also conforms with clinical professional requirements; proposed designing and developing surgical simulation platform using COM (Component Object Model) component technology. Surgical simulation platform based on COM designed three core module: model management; surgical planning; surgical evaluating;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.