Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
One of the biggest shortcomings in the traditional mobile public information system is lack of a reasonable mechanism for data mining, which can not be reasonably classification of the publish information and scientific analysis of the public feedback information. In order to compensate for this shortfall, we describe a public service information and public feedback-based intelligent mobile public...
A new blind geometric robust watermarking scheme is presented based on singular value decomposition (SVD) and discrete wavelet transform (DWT). In the scheme, the host image is decomposed with n-level DWT and the low frequency sub-band is divided into nonoverlapping blocks. SVD is applied to every block. The watermark is embedded into the low frequency DWT coefficients by modifying the largest singular...
Segmentation is an important step in medical image analysis. This process is crucial but challenging due to inhomogeneneity in intensity of images. In addition, the images are often corrupted by noise and with contrast edges. There are some approaches aiming to cope with this kind of images such as: region growing, region competition, watershed segmentation, global thresholding, and active contour...
In this paper, we will present a cathode film with a configuration of spaced and densely populated small CNT clusters. Depending on the particular process to be described here and the desired application, randomly located clusters ranging from 1-2 μm in size with densities > 106/cm2 to single or a few CNTs with densities > 107/cm2 can be fabricated. Combined with optimal growth conditions, these...
In the past decades, the main focus of optimization studies including multi-objective optimization was placed on finding the global optimum or Pareto-optimal solutions. However, in practical engineering, users may not always be interested in finding the so-called global best solutions, particularly when these Pareto-optimal solutions are quite sensitive to the variable perturbations, which cannot...
For improving accuracy and robust property of human detection, fusion of image sequences captured from visible-thermal sensors is lucrative. Instead of performing it in pixel-level directly, we try to fuse object features by a novel image sequence fusion algorithm based on gradient feature (GFIF). The GFIF algorithm calculate gradients of input images to form a joint histograms of Oriented Gradient...
In this paper, we propose a novel hierarchy-aware ECC model termed HHECC for access control in Cloud. This model is implemented by a hierarchical and hybrid Elliptic Curve Cryptography (ECC) encryption on Cloud data. Cloud is a popular storage platform to build data center for data backup, file synchronization and resource sharing. Since accessed by various kinds of users, the Cloud storage services...
Digital watermark technology is used to protect the legal owner's copyrights. We propose a blind watermarking algorithm combination of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). The watermark is scrambled by Arnold and embedded in a spread spectrum pattern using pseudo random. The block-based DCT transform of DWT LL sub-band is computed and the pseudo random sequence of...
Adaptive stepping sliding mode control strategy for the overload control of anti-ship missiles using Lyapunov's stability theory is proposed. In the first few steps, we assume there exists a virtual actuator, the virtual actuator concept can make the desired value can be easily traced, in the last step, a sliding mode controller is applied to guarantee the robustness of the system. At the same time,...
This paper provides supporting technology for improvement of gaseous fuel automobiles and clean automobiles. Air fuel ratio control system is researched and developed. Experimental study on air fuel ratio control in gaseous automotive engine is implemented. The strategy which combines with open loop control and closed loop control is adopted in this electronic control system. When the circumstance...
This paper highlights software reuse technology and classifies. The emphasis of the paper presents the model of component and Studies COTS. As the result, this paper points out component reuse is fine granularity's reuse in construction software system. But during building “system in system” process, it's impossible that developers do everything starting from scratch. COTS (Commercial off the shelf)...
To improve the tracking precision, integrated control strategy of Permanent Magnet Linear Synchronous Motor (PMLSM) based on sliding mode control and repetitive control was proposed in this paper. Because PMLSM is easily affected by the periodic thrust fluctuation caused by the end effect, the periodic friction and other aperiodic disturbance during operating. The speed controller and the current...
Digital integrated service broadcasting system based on mature digital broadcasting technology is a significant interest in the future broadcasting. This paper introduces a digital integrated service broadcasting system based on the DRM (Digital Radio Mondiale) technique and analyzes its transmission, content service and networking.
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of hiding methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from...
A intelligent monitor and control system on multi-factor of aquaculture environment based on wireless sensor networks is designed adopting BP neural networks. The system uses wireless sensor nodes to detect a variety of water quality parameters transmitted to the on-site monitoring host computer through sink node wirelessly. The control module consists of fuzzy controller and decoupling neural network...
After intensive revision of different research materials on digital watermarking in related with our topic we find that fidelity, robustness, fragility, and modification are the key variables which need technical support during application. Using the secondary data we also state interrelated concepts of digital watermarking and show the problems in this regard through figure. In addition we develop...
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents some new approaches for steganography in Indian Languages. Considering...
Two-dimensional gel electrophoresis (2D-GE) is the powerful technique used by biochemists to resolve and visualize protein samples. The 2D-GE images depict protein signals as spots of various intensities and sizes. Currently, the most popular technique for spot detection in 2D-GE image is the watershed transform (WST) due to its robustness. However presence of noise in 2D-GE images forces WST to oversegment...
Internet evolution, along with the advancement of digital multimedia tools have create a major impact in making the storage and distribution of multimedia content a straightforward tasks. Thus security of multimedia contents becomes a vital issue and there is a need in protecting the digital content against counterfeiting, piracy and malicious manipulations. Digital watermarking is an evolving field...
Total robustness to illumination change is difficult to solve just using a single approach. Our approach to improvement in accuracy and robustness to illumination change is by fusing two different methods, namely, color constancy and color co-occurrence. A “grey world” assumption is used to handle sudden illumination change while color cooccurrence modelling is used to handle gradual illumination...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.