Reactive power optimization of power system is an effective means to ensure the safety and economic operation of the system. It is an important measure to reduce the power loss and improve the power quality. In this p...
详细信息
In the paper, a new multi-channel speech coding method is proposed by extracting spatial cue parameters called inter-channel time difference (ICTD) and inter-channel energy ratio (ICER). Based on these two spatial cue...
详细信息
The vast parallelism, exceptional energy efficiency and extraordinary information density inherent in DNA molecules are being explored for computing, data storage and cryptography. DNA cryptography is a new field of c...
详细信息
ISBN:
(纸本)9781424427246
The vast parallelism, exceptional energy efficiency and extraordinary information density inherent in DNA molecules are being explored for computing, data storage and cryptography. DNA cryptography is a new field of cryptography arising with the research of DNA computing in recent years. In this paper, an encryption scheme is designed by using the technologies of DNA synthesis, PCR amplification and DNA digital coding as well as the theory of traditional cryptography. By applying the special function of primers to PCR amplification, the primers and coding mode are used as the key of the scheme. The traditional encryption method and DNA digital coding are used to preprocess to the plaintext, which can effectively prevent attack from a possible word as PCR primers. Biological difficult issues and cryptography computing difficulties provide a double security safeguards for the scheme. And the security analysis shows that the encryption scheme has high confidential strength. To demonstrate the performance, we present an interesting example to encode and decode message just between specific two persons using the proposed scheme.
The main contribution of this paper is the design of several efficient algorithms for modified run-length chain coding and for computing shape's moments on arrays with reconfigurable optical buses. We first propos...
详细信息
With the rapid growth of multimedia technology, sharing of multimedia components have become a common practice. Thus, compression of image has become an integral approach that motivates the image compression for the e...
详细信息
ISBN:
(纸本)9781538662274
With the rapid growth of multimedia technology, sharing of multimedia components have become a common practice. Thus, compression of image has become an integral approach that motivates the image compression for the efficient and lossless transmission and for storage of digital data. Huffman coding is one of the entropy encoding approach for compression of image. This paper is based on the fractal image in which Canonical Huffman coding is used for better fractal compression than arithmetic encoding. The result obtained shows that Canonical Huffman coding increases the speed of the compression and has good PNSR, as well as it has better compression ratio than standard Huffman coding.
As data and knowledge volumes keep increasing, and global means for information dissemination continues to diversify, new methods, modeling paradigms and structures are needed to efficiently support the mounting scala...
详细信息
As data and knowledge volumes keep increasing, and global means for information dissemination continues to diversify, new methods, modeling paradigms and structures are needed to efficiently support the mounting scalability requirements for the large variety of current and future data, information, and knowledge [1–3]. Grid computing, peer-to-peer technology, data and knowledge bases, distributed information retrieval technology, and networking technology should all converge to address the scalability concern. This special section compiles recent work on addressing scalability issues of distributed and peer-to-peer systems. Selected papers from the Second internationalconference on Scalable information Systems (INFOSCALE 2007) were invited for extension and submission to this special section. Finally, five papers were included in this special section.
Results from any existing clustering algorithm that are used for segmentation are highly sensitive to features that limit their generalization. Shape is one important attribute of an object. The detection and separati...
详细信息
To achieve high-efficiency and high-reliable data transfer between each pair of users in multiinput multi-output (MIMO) wireless communication, researchers show concerns for communication system that has become a key ...
详细信息
In wireless networks, communications among nodes are vulnerable to attacks launched by malicious nodes. Presently, Existing malicious node detection approaches either need special hardware or depend on node listening,...
详细信息
ISBN:
(纸本)9780769546001
In wireless networks, communications among nodes are vulnerable to attacks launched by malicious nodes. Presently, Existing malicious node detection approaches either need special hardware or depend on node listening, node encryption or node identity authentication, resulting high costs of networks. In this paper, we present a novel network coding-based malicious detection approach called DENNC for wireless networks. The key idea is to use the characteristic of information exchange to validate the information packets. The neighboring nodes of the sending node may judge the malicious behaviors by checking the correctness of the data packets and related hash value. Our approach requires no superfluity hardware and does not use complicated secret key encryption mechanisms. Analysis reveals that the proposed approach can detect the malicious node in highly probability.
H.264/AVC is the newest video coding standard with high compression efficiency. Because it will take a long time to code with extremely complex algorithm, it can not achieve real-time application. In this paper, accor...
详细信息
暂无评论