In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security...
详细信息
In this paper we employ the Integrated Active Contour (IAC) model of vector-value image segmentation and C-V model based on PDE in the segmentation of two channels DMSP nighttime satellite cloud images. The results of...
详细信息
In this paper, a new face recognition method based on local binary pattern(LBP) histogram is presented. First, the grey face image is divided into several parts, and then the LBP histogram of each part is calculated a...
详细信息
ISBN:
(纸本)9781612848372
In this paper, a new face recognition method based on local binary pattern(LBP) histogram is presented. First, the grey face image is divided into several parts, and then the LBP histogram of each part is calculated and concatenated together. Second, extract other concatenated histograms using different LBP operators and image blocking patterns. All the histograms above are concatenated into the ultimate vector. The proposed approach was tested using Yale face database on Android platform. Experimental results demonstrate that the combined LBP histogram feature has an encouraging performance for face recognition.
Wireless sensor and actor networks (WSANs) can be considered as a combination of sensor network and actor network in which powerful and mobile actor nodes can perform application specific actions based on the received...
详细信息
ISBN:
(纸本)9781612848372
Wireless sensor and actor networks (WSANs) can be considered as a combination of sensor network and actor network in which powerful and mobile actor nodes can perform application specific actions based on the received data from the sensors. As most of these actions are performed collaboratively among the actors, so the connected inter-actor network is important to the effectiveness of WSANs. However, such connectivity can be lost due to the failure of actors. To handle this connectivity problem, we present a distributed scheme CCRA to detect possible broken connectivity, and then restore the network connectivity through relocation of actors. The effectiveness of CCRA is validated through simulation experiments.
We propose generalized linear mixed models with linear structural random effects based on generalized linear mixed models. In this article, an Monte Carlo EM type al- gorithm is developed for maximum likelihood estima...
详细信息
ISBN:
(纸本)9781612848372
We propose generalized linear mixed models with linear structural random effects based on generalized linear mixed models. In this article, an Monte Carlo EM type al- gorithm is developed for maximum likelihood estimations of the proposed models. To avoid computation of the complicated multiple integrals involved, the E-step is completed by Monte Carlo techniques. The M-step is carried out efficiently by simple Conditional Maximization. Standard errors of MLEs are obtained via Louis’s identity.
Such advantages as self-adaption, multi-functions, low cost and low power etc make the technology of reconfiguration be the development tread of embedded system. The aim of this paper is to give a reconfigurable, embe...
详细信息
Aiming at the problems of that capital information, project information and enterprise information scattered, and the lack of supporting for the trading platform in Shanxi venture capital management, this paper summar...
详细信息
ISBN:
(纸本)9781612848372
Aiming at the problems of that capital information, project information and enterprise information scattered, and the lack of supporting for the trading platform in Shanxi venture capital management, this paper summarizes the venture system and platform construction contents of Shanxi province. And based on the study on BS rich client technology, the paper brings out a venture capital information platform based on the technology of GWT and AJAX service, which effectively realizes the venture capital information sharing and interaction, and lays a good technical foundation for the implementation of the latter part of the transaction and case management functions and other functions.
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or...
详细信息
ISBN:
(纸本)9781612848372
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient and reliable broadcast in wireless sensor networks. A lightweight energy-efficient reliable broadcast tree, or LERBT, is proposed to provide a framework by which to support reliable broadcast while reducing the broadcast coverage overlap and power consumption. Additionally, LERBT can configure itself quickly, allowing the base station to begin broadcasting commands shortly after deployment. Simulation results show the protocol can save significant energy over SBA and LKDT without sacrificing the coverage and reachability.
signature library is key factor for performance of anti-virus programs considering accuracy and scanning *** ensure coverage of various emerging viruses,the scale of signature library grows larger and the consequence ...
详细信息
ISBN:
(纸本)9781612848372
signature library is key factor for performance of anti-virus programs considering accuracy and scanning *** ensure coverage of various emerging viruses,the scale of signature library grows larger and the consequence is lower efficiency because of the need of matching against more *** paper's target is to decrease the signature mapping cost by optimizing signature *** advantage of common conduct characteristics of viruses such as self replica and seasoning,this paper proposed optimization policy against this scalable issue with help of data *** data simulation shows significant potential performance improvement using the proposed optimization policy.
Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g.;banner ads,navigation bars,copy right and privacy notices,advertisements which are not related to the ...
详细信息
ISBN:
(纸本)9781612848396
Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g.;banner ads,navigation bars,copy right and privacy notices,advertisements which are not related to the main content(relevant information).In this paper,an algorithm is proposed that extract the main content from the web *** algorithm based on Content Structure Tree (CST).Firstly,the proposed system use HTML Parser to construct DOM(Document Object Model)tree from which construct Content Structure Tree(CST)which can easily separate the main content blocks from the other *** proposed system then introduce cosine similarity measure to evaluate which parts of the CST tree represent the less important and which parts represent the more important of the *** proposed system can define the ranking of the documents using similarity values and also extracts the top ranked documents as more relevant to the query.
暂无评论