The development of modern information technology has promoted the construction of digital learning environment which represented as digital learning harbor, in this situation, teachers39; learning community became a...
详细信息
ISBN:
(纸本)9781612848372
The development of modern information technology has promoted the construction of digital learning environment which represented as digital learning harbor, in this situation, teachers' learning community became an effective shortcut for teachers' professional development. This paper comes from digital learning harbor project, analyses and defines the connotations of teachers' learning community in the digital learning environment, and makes an intensive study of the effective support from digital learning harbor to teachers' learning community.
Segmentation of moving objects in an image sequence is one of the most fundamental and crucial steps in visual surveillance applications. This paper proposes a novel and efficient method for detecting moving objects i...
详细信息
Current 3D ear identification methods require capturing ear range image data to work. In this work, based on slice curve matching, a new 3D point cloud ear identification approach is presented. Aiming to acquire 3D po...
详细信息
Resource scheduling is a key process for clouds such as Infrastructure as a Service cloud. To make the most efficient use of the resources, we propose an optimized scheduling algorithm to achieve the optimization or s...
详细信息
Information technology course features decide that its construction and implementation have strong dependence on facilities and equipments. In China, the development of material and technical conditions is uneven;this...
详细信息
Due to increasing the technologies security systems are very popular in many *** security of information can be achieved by using encryption and *** cryptography,encrypted data is transmitted after transforming the ot...
详细信息
ISBN:
(纸本)9781612848396
Due to increasing the technologies security systems are very popular in many *** security of information can be achieved by using encryption and *** cryptography,encrypted data is transmitted after transforming the other form instead of the original data. Contrast cryptography,information hiding process can be extended for protecting from the interesting of any attacker. This paper proposes the enhance security system by combining these two *** this system,the encrypted message is embedded in a BMP image *** proposed system,three LSB steganographic techniques have been implemented and *** proposed system intends for data confidentiality,data authentication and data *** system not only enhances the security of data but also becomes more powerful *** system intends to support effective ways for protecting *** primary goal of our system is to enhance the security of data and then to compare three steganographic *** we will use the optimized method for *** this paper,we just present three steganographic *** this system,data is encrypted with RC4 encryption algorithm and then embedded the encrypted text in the BMP image file using three steganogrpaphic methods.
This paper mainly talks about the physical model of rubber/PVDF semi-active piezoelectric composite level-based system, and the calculation method of sound energy loss of the system is studied too. The principle of im...
详细信息
The first few batches of cassava harvester embedded depth is not deep enough or too deep, the rate of pick up is not efficient and not efficient cassava into the soil of time differences, and for different levels of t...
详细信息
With the growing and improving network services, diverse interests of users have been satisfied, and the same resources have been visited repeatedly becomes a common phenomenon. Thus, in the process of data transmissi...
详细信息
Windows registry from physical memory contains lots of important information that are of potential evidential value in forensic analysis. In this paper, a method of extracting windows registry information from physica...
详细信息
暂无评论