It has become a topic of concern around the world about how to supervise entirely the food quality and safety to protect the consumer's healthy diet. This paper study the key factors of quality and safety traceabi...
详细信息
To design and test vision algorithms efficiently, especially to train programs based on evolutionary computation, this paper introduced virtual reality technology into the design of soccer robot system, and establishe...
详细信息
Digital home network has developed rapidly in recent years, but existing security mechanism against external attacks rather than internal attacks restrict its further development. In this article, we introduce TCM, tr...
详细信息
ISBN:
(纸本)9781424472369
Digital home network has developed rapidly in recent years, but existing security mechanism against external attacks rather than internal attacks restrict its further development. In this article, we introduce TCM, trusted network connection and digital certificate mechanism into digital home system architecture to propose architecture of the trusted digital home system, so that extend the trust mechanism used by terminals to the network and build a trusted digital home network environment.
This paper presents an improved ID3 algorithm for computer forensics. Forensics data are volatile, noisy and dispersive. Based on these characteristics, ontology is used to produce the inheritance relation tree. Leade...
详细信息
Judging private path is a kind of special privacy-preserving geometric calculation. In this paper, a private-preserving curvet-ellipse position relation determination protocol is proposed based on the Private-Preservi...
详细信息
This paper defines for standardization a particular adaptive source coding algorithm that has widespread applicability to many forms of digital data. In particular, the science data from real time systems of imaging o...
详细信息
ISBN:
(纸本)9781424472369
This paper defines for standardization a particular adaptive source coding algorithm that has widespread applicability to many forms of digital data. In particular, the science data from real time systems of imaging or non-imaging instruments are well suited for the application of this algorithm, which based on the Rice algorithm, as recommended by the CCSDS (Consultative Committee for Space Data system). The whole compression system has been verified by performing several tests using vectors recommended by CCSDS, but suitably expanded and improved in order to check the algorithm efficiency and its capability to support several space applications.
The existing Timed Influence Nets (TIN) framework is assumed that delays on arcs are constant. This constraint may turn out to be unrealistic in many real world situations. The proposed parametric enhancements would o...
详细信息
Measurement of rail abrasion is an important way to ensure the safety of transportation. The method of Non-contact measurement is adoptted to rails with eddy current sensors based on the structural analysis of rails a...
详细信息
This paper introduces five methods of combined programming base on VB and Matlab, and mainly introduces the ActiveX OLE method that is the most popular at present by its application in mining area land information sys...
详细信息
IDEF modeling Method has a distinguishing trait that is simple and easily masterd, It is abroad applied to describe the complex system *** analyzing the Equipment support characteristic and combine the IDEF0 with IDEF...
详细信息
暂无评论