Serial Digital Interface (SDI) has become a standard video interface gradually. The former methods to implement the SDI cause much costs and low agility. Aiming at the situation that analogue and digital coexist, this...
详细信息
at the present time, the increase of e-mail spam are heavy to cumber and the spam are vastly spread. These spams cause various problems to the Internet users, such as full incoming mailbox, and wasting time. Therefore...
详细信息
ISBN:
(纸本)9781424455379
at the present time, the increase of e-mail spam are heavy to cumber and the spam are vastly spread. These spams cause various problems to the Internet users, such as full incoming mailbox, and wasting time. Therefore, tremendous methods have been proposed but most of them have limitation in the mapping feature and processing time. This paper proposed a method that can detect a set of image e-mail spam. This proposes method can be described in 3 steps: firstly, this method receives an incoming mail and convert image to me and produce the characteristic of image database or corpus. Secondly, explain about the structure of the search corpus with Van Emde Boas trees structure and then retrieve data and verity image with content-bases image retrieval (CBIR) from corpus. The important feature of this research methodology is that it will sensitively distinguish e-mail message that has a partial similarity of e-mail spam from the normal e-mail. Therefore, users will have a legitimate incoming mailbox as wish.
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one o...
详细信息
ISBN:
(纸本)9781424455379
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one of the fastest economic growth of China, the online payment and its security becomes particularly important. This paper analysis from three aspects: the current development status of e-commerce online payment in China and its main ways of payment, as well as the existing problems. And combined the actual situation in our country, raised the foundation of e-commerce third-party online payment platform, especially, raised a new perspective: Design and develop the payment software for client-side as well as integrated planning the third-party online payment platform, in order to establish the unit and rational interface which can match the payment software for client-side. Make sure the security of the online payment transactions can be achieved.
The rubber seals material is not rigid, and easy deformed. To realize rubber seals size measurement automatically, computer vision technology based on non-contact measurement is employed, invariant as standard of size...
详细信息
ISBN:
(纸本)9781424455379
The rubber seals material is not rigid, and easy deformed. To realize rubber seals size measurement automatically, computer vision technology based on non-contact measurement is employed, invariant as standard of size measurement is studied. The full and smooth contour is segmented using de-noised with average template and gray thresh with iterative method, and chain code description is modified according the type of chain code connection directions;a approach of perimeter invariance is proposed to measure seals diameter parameter based on the relationship analyzed between the deformation of an ellipse and the circle;the chain code optimal weight is proposed and calculated with least square method using the standard circle, and compared with the chain code weight computed by other methods. The simulation experiments show that the size measurement algorithm achieves a high accuracy.
Although simple genetic algorithm (SGA) can, to some extent, improve the back propagation neural network (BP), it is prone to prematurity and losing the optimal solutions. Niche technology and fuzzy control theory are...
详细信息
ISBN:
(纸本)9781424455379
Although simple genetic algorithm (SGA) can, to some extent, improve the back propagation neural network (BP), it is prone to prematurity and losing the optimal solutions. Niche technology and fuzzy control theory are introduced to improve SGA and the improved one is used to optimize BP. The improved genetic algorithm is used to optimize BP neural network. In addition, due to the increasingly voltage levels and the effect from many other uncertain factors such as the continuously changing temperature, the application of a single forecasting model is limited. So in the end of this paper, the BP optimized is combined with GM algorithm, which was proposed by the known professor Julong Deng in 1982 and is popular with the researchers studying prediction. Both of the optimized BP and the combinational predicting model was used on the prediction of gas-in-oil in some transformers. The results of the experiments show that the proposed optimizing strategy is valuable and practicable.
Particle system has become the attention and research hotspot, it has simple operation and real-time displays features when it is used to express natural scenery. The characteristics of flame are analyzed, we introduc...
详细信息
As the candidate for the next generation information infrastructure, The grid is catched the close attention of research workers in recent years. Grid resource management makes up of resource discovery, resource alloc...
详细信息
Establishing of the idea and institutions of life-long education is an important sign of modern education and life-long education stress that the whole life of one person needs education. Therefore, people are paying ...
详细信息
information hiding can hide secret messages inside of image, video, audio, document, and other digital objects. The messages are invisible to general observers. information hiding has become a new research hotspot of ...
详细信息
ISBN:
(纸本)9781424455379
information hiding can hide secret messages inside of image, video, audio, document, and other digital objects. The messages are invisible to general observers. information hiding has become a new research hotspot of information security and copyright protection of digital multimedia recently. XML document is used as cover-media in XML document information hiding algorithms. A new algorithm of XML document information hiding based on equal element is presented, which overcomes the shortcoming of imperceptibility, robustness and hiding capacity of traditional XML document information hiding algorithms. According to the embedded rule, firstly, the algorithm turns secret message to a decimal integer, and then created equal element through sub-elements' permutation and combination. According to mapping function between integer and equal element, the integer is embedded into the XML document by replacing the element with its equal element. The experimental results show that the algorithm does not change the size of XML document, and has good imperceptibility and robustness. The embedding capacity of the algorithm gets better increase than traditional XML document information hiding algorithms. So the algorithm could be used to covert communication and protect the content of XML documents.
This paper presents an intelligent instrument with strong versatility, efficiency, low cost and other advantages. The function of data-processing is described using the chip of STM32F103C6 as the master controller, an...
详细信息
暂无评论