首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform(DFT), each watermark bit is embedded into each homocentric circles around the zero frequency term in DFT domain by quantizing the magnitude vector of Fourier spectrum. The embedded sequence can he extracted by ““““““““majority principles““““““““ without restoring to the original unmarked image. The experimental results show that the watermark is invisible and robust to any combination of geometrical transformations or common image processing techniques.  相似文献   

2.
Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we can transform between qualitative reputation and quantitative voting data. The present paper brings forward algorithms to compute direct trust and recommender trust. Further more, an effective similarity measuring method used to distinguish two users' reputation on knowledge level is also proposed. The given model properly settles the uncertainty and fuzziness properties of subjective trust which is always the weakness of traditional subjective trust model, and provides a step in the direction of proper understanding and definition of human trust.  相似文献   

3.
Forms enhance both the dynamic and interactive abilities of Web applications and the system complexity. And it is especially important to test forms completely and thoroughly. Therefore, this paper discusses how to carry out the form testing by different methods in the related testing phases. Namely, at first, automatically abstracting forms in the Web pages by parsing the HTML documents; then, ohtai ning the testing data with a certain strategies, such as by requirement specifications, by mining users' hefore input informarion or by recording meehanism; and next executing the testing actions automatically due to the well formed test cases; finally, a case study is given to illustrate the convenient and effective of these methods.  相似文献   

4.
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm.  相似文献   

5.
This paper proposes a security enhancement scheme for disaster tolerant system based on trusted computing technology which combines with the idea of distributed threshold storage. This scheme takes advantage of trusted computing platform with trusted computing module, which is provided with such excellent features as security storage, remote attestation, and so on. Those features effectively ensure trustworthiness of disaster tolerant point. Furthermore, distributed storage based on Erasure code not only disposes the storage problem about a great deal of data, but also preferably avoids one node invalidation, alleviates network load and deals with joint cheat and many other security problems. Consequently, those security enhancement technologies provide mass data with global security protection during the course of disaster tolerance. Foundation Items: Supported by the National High Technology Research and Development Program of China (863 Program) (2008AA01Z404), the Science and Technical Key Project of Ministry of Education (108087) and the Scientific and Technological Project of Wuhan City (200810321130)  相似文献   

6.
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too. Foundation item: Supported by the Hi-Tech Research and Development Foundation item: Supported by the Hi-Tech Research and Development Biography; Tu Hang (1975-), male, Ph. D candidate, research directions: Biography; Tu Hang (1975-), male, Ph. D candidate, research directions:  相似文献   

7.
Orientl: A strategy of Web information integration   总被引:1,自引:1,他引:0  
We propose the OrientI approach for effectively building flexible applications on information integration. The system presents a fully visual development environment tobuild applications. With Orient I system, a user only needs to concentrate on the composition of components for building the InterPlan. and the detailed underlying operations and data streams are invisible to the user. A prototype system has been implemented and has partially proved the convenience hrought by the Orient] approach.  相似文献   

8.
Based on the study of visitors‘ individual spatial behaviors, a tourists‘ spatial behavior simulator (TSBS) to assess the carrying capacity of tourist resorts was developed, TSBS employs GIS (Geographic Information System) to manage the spatial data, and Multi-Agent system to simulate the actions of individual visitors. By utilizing TSBS, visitors‘ travel patterns such as location, cost, and state can be analyzed and predicted. Based on this analysis and prediction, the model of assessing the carrying capacity of resorts is built. Our results show that TSBS will be an effective tool to accurately assess the carrying capacity of tourist resorts.  相似文献   

9.
Because of the iterative process in the rate control algorithm of H.264 draft, it is not suitable for real-time transmission. A two-layer real-time rate control algorithm based on Lagrange optimum algorithm is proposed. This algorithm consists of two layers, namely, the group of pictures (GOP) layer and the frame layer. The simulation results show that the proposed algorithm is competitive in terms of peak signal to noise ratio (PSNR), real bitrates and the Q-value among frames over the original algorithm. Foundation item: Supported by the National High-Technology Research and Development Program of China (863 Program) (2001AA132050-03) and the Key Project of Chinese Ministry of Education (211CERS-10)  相似文献   

10.
Clipping is a simple and convenient PAPR (peak-to-average power ratio) reduction method for high speed OFDM (orthogonal frequency division multiplexing) communication system. In this paper, we propose a new PAPR reduction method for Wireless-MAN(metropolitan area network)-OFDM system based on IEEE 802.16, which is over-sampling clipping arithmetic. Simulation and performance of the over-samples clipping's PAPR reduction capability, BER effect is given. The simulation indicates that the PAPR of at least 99.9% OFDM symbol is below 6dB after 2 Nyquist rate clipping, and the performance of BER has 1dB SNR(signal noise ratio) loss. The results prove that this method has better capacity to reducing PAPR. So it can be well used in WMAN-OFDM system.  相似文献   

11.
Based on Remote Sensing (RS), Geographic Information System (GIS), and combining Principal Component Analysis, this paper designed a numerical integrated evaluation model for mountain eco-environment on the base of grid scale. Using this model, we evaluated the mountain eco-environmental quality in a case study area-the upper reaches of Minjiang River, and achieved a good result, which accorded well with the real condition. The study indicates that, the integrated evaluation model is suitable for multi-layer spatial factor computation, effectively lowing man's subjective influence in the evaluation process; treating the whole river basin as a system, the model shows full respect to the circulation of material and energy, synthetically embodies the determining impact of such natural condition as water-heat and landform, as well as human interference in natural eco-system; the evaluation result not only clearly presents mountainous vertical distribution features of input factors, but also provides a scientific and reliable thought for quantitatively evaluating mountain eco-environment.  相似文献   

12.
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.  相似文献   

13.
The photosynthetic activities between two main developmental stages, colony and hormogonium, of the edible cyanobacterium Nostoc sphaeroides Kutzing, were compared. Hormogonia have a higher content of chlorophyll than that of colonies. It showed that the ratios of phycocyain (PC), allophycocyain (APC) and phycoerythrocyanin (PEC) in hormogonia and colonies were different. The room temperature chlorophyll fluorescence, 77 K chlorophyll fluorescence, measurements of PSⅠand PS Ⅱ activities all showed that colony has higher photosynthetic competence than hormogonia. Hormogonia had a higher respiration rate than colony, while their maximum photosynthetic oxygen evolution rates were very close. The responses of hormogonia and colonies to high light illuminations also were different. Both of their oxygen evolution rates decreased quickly with the prolonged high light illumination, but hormogonia can keep relatively higher PSⅡ activity (Fv/Fm) than that of colonies. The results suggested that colony was photosynthetically more competent than hormogonia, while the ability of hormogonia to tolerate high light illumination was higher than that of colony.  相似文献   

14.
The paper presents a prototype of virtual decoder of the transport stream's system target decoder (T-STD). By connecting the coding model and decoding model, and feeding the overflow of decoding buffer back to control coding, we have got a self-adaptive coding model, and propose an algorithm of muhiplexing multiple elementary streams to a transport stream based on the principle of virtual buffer controlling strategy. The transport stream (TS) which uses this method passes the test of software unzipping and set top-box (STB) playing, and all of the analyzing parameters which are detected by code analyzer accord with the standard of MPEG-2. Some problems that playing time becomes longer and mul tiple TS streaming can not be fit for all the players are also analyzed.  相似文献   

15.
This paper analyzes PROFIBUS-DP network delay in detail and presents the calculational formula of its maximum time-delay, which is significant to the research of PROFIBUS-DP. At the same time, the paper puts forward a method of simplifying the network induced time-varying indeterminate system according to the features of the network. Through the analysis of a pump-control-motor system which is composed of PROFIBUS-DP network, it illustrates the network's influence on the performance of control systems. This method helps to design and analyze the network's influence on the performance of control systems, which is of considerable practical value in a time when network control systern is widely used.  相似文献   

16.
In this work, Kendall correlation based collaborative filtering algorithms for the recommender systems are proposed. The Kendall correlation method is used to measure the correlation amongst users by means of considering the relative order of the users' ratings. Kendall based algorithm is based upon a more general model and thus could be more widely applied in e-commerce. Another discovery of this work is that the consideration of only positive correlated neighbors in prediction, in both Pearson and Kendall algorithms, achieves higher accuracy than the consideration of all neighbors, with only a small loss of coverage.  相似文献   

17.
We propose two models in this paper. The concept of association model is put forward to obtain the co-occurrence relationships among keywords in the documents and the hierarchical Hamming clustering model is used to reduce the dimensionality of the category feature vector space which can solve the problem of the extremely high dimensionality of the documents~ feature space. The results of experiment indicate that it can obtain the co-occurrence relations among keywords in the documents which promote the recall of classification system effectively. The hierarchical Hamming clustering model can reduce the dimensionality of the category feature vector efficiently, the size of the vector space is only about 10% of the primary dimensionality.  相似文献   

18.
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced.  相似文献   

19.
20.
In this paper, algorithms of constructing wavelet filters based on genetic algorithm are studied with emphasis on how to construct the optimal wavelet filters used to compress a given image,due to efficient coding of the chromosome and the fitness function, and due to the global optimization algorithm, this method turns out to be perfect for the compression of the images. Foundation item: Supported by the Natural Science Foundation of Education of Hunan Province(21010506) Biography: Wen Gao-jin( 1978-), male, Master candidate, research direction: evolutionary computing.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号