The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For improving accuracy and robust property of human detection, fusion of image sequences captured from visible-thermal sensors is lucrative. Instead of performing it in pixel-level directly, we try to fuse object features by a novel image sequence fusion algorithm based on gradient feature (GFIF). The GFIF algorithm calculate gradients of input images to form a joint histograms of Oriented Gradient...
In this paper, we propose a novel hierarchy-aware ECC model termed HHECC for access control in Cloud. This model is implemented by a hierarchical and hybrid Elliptic Curve Cryptography (ECC) encryption on Cloud data. Cloud is a popular storage platform to build data center for data backup, file synchronization and resource sharing. Since accessed by various kinds of users, the Cloud storage services...
Digital watermark technology is used to protect the legal owner's copyrights. We propose a blind watermarking algorithm combination of Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). The watermark is scrambled by Arnold and embedded in a spread spectrum pattern using pseudo random. The block-based DCT transform of DWT LL sub-band is computed and the pseudo random sequence of...
Adaptive stepping sliding mode control strategy for the overload control of anti-ship missiles using Lyapunov's stability theory is proposed. In the first few steps, we assume there exists a virtual actuator, the virtual actuator concept can make the desired value can be easily traced, in the last step, a sliding mode controller is applied to guarantee the robustness of the system. At the same time,...
This paper provides supporting technology for improvement of gaseous fuel automobiles and clean automobiles. Air fuel ratio control system is researched and developed. Experimental study on air fuel ratio control in gaseous automotive engine is implemented. The strategy which combines with open loop control and closed loop control is adopted in this electronic control system. When the circumstance...
This paper highlights software reuse technology and classifies. The emphasis of the paper presents the model of component and Studies COTS. As the result, this paper points out component reuse is fine granularity's reuse in construction software system. But during building “system in system” process, it's impossible that developers do everything starting from scratch. COTS (Commercial off the shelf)...
To improve the tracking precision, integrated control strategy of Permanent Magnet Linear Synchronous Motor (PMLSM) based on sliding mode control and repetitive control was proposed in this paper. Because PMLSM is easily affected by the periodic thrust fluctuation caused by the end effect, the periodic friction and other aperiodic disturbance during operating. The speed controller and the current...
Digital integrated service broadcasting system based on mature digital broadcasting technology is a significant interest in the future broadcasting. This paper introduces a digital integrated service broadcasting system based on the DRM (Digital Radio Mondiale) technique and analyzes its transmission, content service and networking.
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of hiding methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from...
A intelligent monitor and control system on multi-factor of aquaculture environment based on wireless sensor networks is designed adopting BP neural networks. The system uses wireless sensor nodes to detect a variety of water quality parameters transmitted to the on-site monitoring host computer through sink node wirelessly. The control module consists of fuzzy controller and decoupling neural network...
After intensive revision of different research materials on digital watermarking in related with our topic we find that fidelity, robustness, fragility, and modification are the key variables which need technical support during application. Using the secondary data we also state interrelated concepts of digital watermarking and show the problems in this regard through figure. In addition we develop...
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents some new approaches for steganography in Indian Languages. Considering...
Two-dimensional gel electrophoresis (2D-GE) is the powerful technique used by biochemists to resolve and visualize protein samples. The 2D-GE images depict protein signals as spots of various intensities and sizes. Currently, the most popular technique for spot detection in 2D-GE image is the watershed transform (WST) due to its robustness. However presence of noise in 2D-GE images forces WST to oversegment...
Internet evolution, along with the advancement of digital multimedia tools have create a major impact in making the storage and distribution of multimedia content a straightforward tasks. Thus security of multimedia contents becomes a vital issue and there is a need in protecting the digital content against counterfeiting, piracy and malicious manipulations. Digital watermarking is an evolving field...
Total robustness to illumination change is difficult to solve just using a single approach. Our approach to improvement in accuracy and robustness to illumination change is by fusing two different methods, namely, color constancy and color co-occurrence. A “grey world” assumption is used to handle sudden illumination change while color cooccurrence modelling is used to handle gradual illumination...
Mutual information (MI) is a well accepted similarity measure for image registration. However, MI based registration faces the challenges of high computational complexity, low registration efficiency and high likelihood of being trapped into local optima due to an absence of spatial information. In this paper, we propose a new multiscale registration framework based upon an edge preserving total variation...
In this paper, the advantages and disadvantages of traditional PID controller and fuzzy logic controller algorithm were analyzed on the control characteristics of electric furnace. According to the intelligent control theory, fuzzy PID (Fuzzy-PID) compound control was selected to realize intelligent control of electric furnace with two-input and two-output system. Based on real temperature control...
With coding stream layered structure and progressive Transmission characteristics in JPEG2000, the paper presents a method research of the hiding fingerprint information. By means of the ranked bit-stream according to the fingerprint feature importance in space bit Planes, the method may adaptively embed hidden fingerprint data into wavelet coefficients from low to high frequency sub-band based on...
Inverted pendulum is a control system, with the feature of high order, muti-variable, non-linearity and unstable naturally. It is quite important for us to study its balance and stability in control engineering field. In this paper, a flywheel inverted pendulum, as an object to be controlled, the dynamic model has been established, and the mathematical model which established has been certificated...
Digital library users might not enter a digital library through homepage menus. As a result, digital library owners should consider the visibility to search engines of stored PDF documents. The aim of this research project was to determine to what extent the visibility of these PDF documents can be improved. In a series of empirical experiments, 100 PDF documents stored on digital libraries were identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.