The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main objective of the present work is an investigation of the computation methods applicability in a cylindrical sealed space, two different geometry constitute methods are introduced, multi-zone model and fluid dynamic model were discussed. Computation results of the two calculation methods are within err of 15% in radial direction, and has different results in the vertical direction upright...
This paper presents a novel and simple pixel-level image authentication scheme to detect the tampered pixels, which utilizes the extreme sensitivity of Hash function in order to achieve precise tamper localization. Block numbers and image unique index are used to extract watermarks and locate tampered position. Moreover, the property of blocks correlation makes it can effectively resist VQ attack...
This paper presents a new method of database design, which bases on Data Floating Direction Chart (DFDC). The method is mainly to solve skip questions from requirement to design, which reflects relationships between tables intuitively as well as relationships between fields, and solve questions on requirement acquisition of database design.
As one of the inevitable elements of the whole logistics procedure, effective Warehousing has great influence on the efficiency and cost of the logistics system as a whole. Based on the principle of lowest power consumption and the theory of probability distribution, this paper establishes a mathematical model for space allocation and finds a suitable method for the incoming goods, aiming to improve...
Structured P2P system doesn't consider the actual physical topology when building the logical overlay, which would cause a serious mismatching between logical overlay network and physical network and affect the routing performance of the system. An advanced algorithm of K-bucket updating strategy base on structured Kademlia system was proposed. Using Landmark Binning algorithm and RTT detection will...
Similarity search for time series has attracted much research attention recently. Flight Data is a set of data arranged by chronological order. Through depth study on the characteristics of Flight Data, in this paper a subsequence matching algorithm based on the Discrete Fourier Transform (DFT) for Flight Data is proposed. In order to reduce the number of dimensions for Flight Data, this algorithm...
According to the ineffective route repair and high routing overheads of classic AODV, a novel cross-layer efficient routing protocol (CLERP) is presented in this paper. CLERP adopts cross-layer design to establish backup route to reduce the packet losses when link breaks occur. To decrease the unnecessary overhead of hello packets, adaptive links connectivity is employed, which uses adjusting rate...
The security of steganographic system is improved by selecting cover. The cover data are modeled as Gauss-Markov process, where the correlation coefficient of two arbitrary data elements is the exponent of correlation parameter. The KL divergence and Bhattacharyya distance of Spread Spectrum steganographic system increase with the correlation parameter. Thus the cover with smaller correlation parameter...
This paper presents a framework of a platform for interactive mathematics education. This platform mainly integrates three technologies: topic-based search engine, Deep Web information integration and Wiki. Mathematics information is gathered by topic robot with mathematics classifier which based on SVM classification algorithm. Form filling technology, based on the web page structure, is used in...
The Fourier describer only describes the boundary shape of the planner target region, and cannot reflect feature inside characteristics. In this paper, the gray distribution of target region is used to describe the target characteristics and boundary shape, and get to reflect the affine invariant feature inside characteristics, which can reflect the origin characteristics more completely. The experiment...
With the rapid development of the oil industry-level demand for steel, the performance of oil steel pipe has put forward higher requirements. Induction heat treatment of steel pipe can improve performance and save cost, so it has been widely used in the steel pipe manufacturing industry. In order to reduce the number of trial-error procedures in plant which usually are long and costly, numerical simulation...
Data Communications is a core course for E-Commerce majors. The major workflows in E-Commerce are implemented based on Data Communications technology. However, it is hard for E-Commerce major students to master data communications technology. To solve this issue, teaching environment and schema theory are discussed in summary firstly, a teaching model based on schema theory is proposed secondly, and...
With the large-scale, open distributed systems appear, creates a dynamic trust management to make up for lack of a static trust mechanism. However, the existing trust models have the following problems: (1) do not consider the historical behavior enough. (2) Can not effectively prevent malicious behavior. To solve the above problems, an trust model based on rewards and punishment mechanism is presented...
Energy consumption is one of the most important issues to the wireless sensor network, which determines the network lifetime. The non-uniform property of energy consumption is studied in this paper. Theoretical analysis indicates that the average energy consumption of the sensor is heavy non-uniform, which decrease with the hop number to the sink node (or the sensor belongs to the high level in a...
Internet Protocol Television (IPTV) is defined as a digital television broadcast service through IP packets over broadband network. The acceptance from users can only be obtained and maintained by utter high video quality outperforming traditional TV which is based on cable or satellite technology. This paper proposes a refined measurement based on MDI (Media Delivery Index) which gives an indication...
Establishment of pairwise keys in wireless sensor networks is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, due to the resource constraints on sensor nodes, establishing pairwise keys in wireless sensor networks is not a trivial task. For the existing key pre-distribution schemes, as the number of compromised nodes...
Face recognition under variable illumination conditions is an unsolved problem. In this paper, we propose a novel face recognition method based on steerable filters and local binary pattern. First, the normalized face image is convoluted by a multiple orientation steerable filters to extract their corresponding steerable magnitude maps (SMM). Then, the features of face image is extracted by linked...
A fast algorithm is proposed in this paper to label connected components in binary document images. Runs are extracted from the image row by row. The positional relations among the runs of current rows and the runs of their preceding rows are represented utilizing trees, where each tree corresponds to a connected component. Only one-pass scan is required for the proposed approach to obtain the characteristics...
In the manifold learning problem one seeks to discover a smooth low dimensional surface, i. e., a manifold embedded in a higher dimensional linear vector space, based on a set of sample points on the surface. In this paper we consider the Clifford manifold theory for investigating the Multispectral image sample points. We introduced a geometric method to obtain asymptotically consistent estimates...
Practically, business activities that have traditionally been conducted via physical mechanisms are being conducted virtually by means of computer technologies. Computer Supported Cooperative Work (CSCW) has been receiving more and more attention both in academia and industry of recent years. However, socio-technical influences on process performance of CSCW have been placed a vital role and need...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.