Digital audio watermarking is an efficient way of copyright protection. A robust watermarking was proposed based on Discrete Cosine Transform and Complex Cepstrum. Special steps are done to enlarge the capacity. And w...
详细信息
Route planning is a very important part in simulation system. Under a simulated circumstance, the simulation can be improved if we can plan a reasonable flight path. This paper studies the helicopter route planning in...
详细信息
Based on the unified management platform of product information, we researched the integrated technology of CAD, PDM and ERP system. Besides, by means of some application cases, we analyzed and illustrated the importa...
详细信息
After reviewing the state of the security technology research and access control in the Web services environment, this paper presents a dynamic role-based access control (UEDRBAC) model through user Iifecycle events a...
详细信息
ISBN:
(纸本)9781424472369
After reviewing the state of the security technology research and access control in the Web services environment, this paper presents a dynamic role-based access control (UEDRBAC) model through user Iifecycle events and a secure architecture model for Web services. A reasonable access control is used to achieve the dynamic authorization by analyzing the relationship among roles based on user life cycle events, and authorization process algorithm is discussed in detail. Finally, it is the conclusion and further research.
In order to realize fast location and detection of abnormal status during running of industrial furnace, especially abnormal status of firing, this article studies and designs a fault diagnosis expert system based on ...
详细信息
Static Synchronous Compensator can be taken as a nonlinear system, which exists in the nonlinear problem during its operation, such as chaos. So, these instability phenomena cannot be predicted in system. This researc...
详细信息
In recent years, with the development of intelligent control theory, neural network theory is applied in various fields. It expands the concept of the calculating content so that the neural computation and evolutionar...
详细信息
This paper analyzes the materials flow, information flow, payments flow and returned items flow of supply chain management firstly. Then the paper discusses the key supply chain management processes in SCOR (Supply Ch...
详细信息
How to make full use of Web service and construct application by composing existing services on demand in the dynamic and open environment is a challenging issue. This paper proposes a user-centric business-user devel...
详细信息
Spurred by the remarkable development of VoIP technology, applications of real-time voice communication has corne into widespread use over the Internet. However, their over reliance on PC environment restricts the app...
详细信息
ISBN:
(纸本)9781424472369
Spurred by the remarkable development of VoIP technology, applications of real-time voice communication has corne into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of most VoIP software, and embedded VoIP is one of these blind spots. The VoIP application in this paper sets the hardware foundation on ARM9 embedded platform, adopts SIP and RTP as the transmission protocol and employs CELP compression algorithms to ensure the low-latency and high-quality communication. In addition, Linux operating system and ALSA device driver are used to meet the needs of cost control and sound effects. Viewed from the experimental results, the VoIP system proves to be successful in both its real time voice communication and overall capacity.
暂无评论