We propose a kind of steganographic algorithm based on the edge processing in this paper. Firstly, the cover is marginalized and reconstructed through mathematical morphology and block markers, then embedding the secr...
详细信息
We propose a kind of steganographic algorithm based on the edge processing in this paper. Firstly, the cover is marginalized and reconstructed through mathematical morphology and block markers, then embedding the secret message into the cover picture successfully with F5 steganographic algorithm. The experiments demonstrate that the different cover image use this algorithm to hide the secret information which holds predominant advantages, such as the small changes in image quality, strong ability in anti-attack, and the secret information can be extracted completely from the carrier image. The above advantages make a broad application prospect.
In decades, lots of QoS routing algorithms have been proposed to let each mobile node in ad hoc networks to find paths based on QoS metrics which are mainly bandwidth and delay. We also proposed to use both Connectivi...
详细信息
In decades, lots of QoS routing algorithms have been proposed to let each mobile node in ad hoc networks to find paths based on QoS metrics which are mainly bandwidth and delay. We also proposed to use both Connectivity Index (CI) and weighted CI, the mathematically combination of link capacity and CI, as the QoS metrics in ad hoc networks. CI is widely used topological index in chemical and mathematical applications. By considering this CI in path computation process, the returned paths are more stable which directly affect throughput and packet delivery ratio of the networks. However, this CI is computed in one dimension only where the exponent or a in the definition of CI is set to-(1/2). CI with this a = -(1/2) is the most successful topological index which has received lots of attentions from chemists and mathematicians. However, the other exponents were also studied as the special case of CI. In this work, we propose to use Shortest-Highest Path algorithm to select the best feasible path in terms of the highest weighted CI and shortest delay link where multiple exponents in weighted CI are applied. We construct simulations in various scenarios to study the effects of these multiple exponents on the heterogeneous ad hoc networks which is more realistic. Since in real applications, multiple types of nodes exist and they usually have different capabilities. Thus, the QoS routings which perform well in homogeneous networks may not be much effective in heterogeneous networks. From the simulation results, it is obvious that Shortest-Highest Path algorithm with weighted CI can also improve the network performances in heterogeneous ad hoc networks.
In a heterogeneous network environment, constructing applications of remote distributed intelligent transportation system (ITS) are faced with complex communication problems proposed by online management, data acquisi...
详细信息
In a heterogeneous network environment, constructing applications of remote distributed intelligent transportation system (ITS) are faced with complex communication problems proposed by online management, data acquisition and the coordination control of traffic node devices. Therefore, a framework based on SIP/ZigBee architecture is proposed. By using SIP and its extensions, a seamless convergence of traffic measurement and control network between the internet and a short-range wireless sensor and actuator networks (WSAN) can be achieved. The application result shows that various remote communications and control operations of ITS distributed nodes can be unified and simplified.
In this paper, a low order recursive linear prediction method and recursive least square as an adaptive filter (LP-RLS) are introduced to predict the speech and the excitation signals. In real-time packet-based commun...
详细信息
ISBN:
(纸本)9781601321916
In this paper, a low order recursive linear prediction method and recursive least square as an adaptive filter (LP-RLS) are introduced to predict the speech and the excitation signals. In real-time packet-based communication systems, one major problem is misrouted or delayed packets which results in degraded perceived voice quality. If packets are not available on time, the packet is known as lost packet. The easiest task of a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system, to avoid quality reduction due to packet loss, a suitable method and/or algorithm is needed to replace the missing segments of speech. The evaluation results show that the proposed method has a lower mean square error (MSE) and higher signal to noise ratio (SNR) compared to the other methods. This particular method also outperforms the low order recursive linear prediction method and normalized least mean square (LP-NLMS).
In order to avoid the shortcomings and deficiencies of solar street lamp systems at present market, in this paper, a new kind of solar street lamps monitoring & control system is designed. By combining ZigBee tech...
详细信息
Chaotic systems produce pseudo-random sequences with good randomness; therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Li...
详细信息
Chaotic systems produce pseudo-random sequences with good randomness; therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption complexity. A security analysis of the proposed system is performed and presented. The proposed method combine pixel shuffling, bit shuffling, and diffusion, which is highly disorder the original image. The initial values and the chaos control parameters of NPWLCM maps are derived from external secret key. The cipher image generated by this method is the same size as the original image and is suitable for practical use in the secure transmission of confidential information over the internet. The experimental results of the proposed method show advantages of low complexity, and high-level security.
The proceedings contain 112 papers. The special focus in this conference is on Computing and Information Science. The topics include: Unified electronic currency based on the fourth party platform integrated payment s...
ISBN:
(纸本)9783642181337
The proceedings contain 112 papers. The special focus in this conference is on Computing and Information Science. The topics include: Unified electronic currency based on the fourth party platform integrated payment service;research on SaaS and web service based order tracking;evaluation of the industrial economic benefits based on TOPSIS;a DS-UWB cognitive radio system based on bridge function smart codes;the application of virtual reality on distance education;analysis towards VMEM file of a suspended virtual machine;study on feed-forward MAP-based vector control method of vehicle drive motor;circulant graph modeling deterministic small-world networks;the design of logistics information matching platform for highway transportation;hybrid schema matching for deep web;RFID-based critical path expert system for agility manufacture process management;research on the evolutionary strategy based on AIS and its application on numerical integration;research on technique of the cyberspace public opinion detection and tracking;a high performance 50% clock duty cycle regulator;study on risk of enterprise' technology innovation based on ISM;immune clone algorithm to solve the multi-object problems;foreign language teachers' professional development in information age;framework for classifying website content based on folksonomy in social bookmarking;research on internal damping algorithm of marine inertial navigation system;the adaptability evaluation of enterprise information systems;structural damage alarm utilizing modified back-propagation neural networks;computation of virtual regions for constrained hybrid systems;fault diagnosis of diesel engine using vibration signals;the deflection identify of the oil storage tank;the effect of product placement marketing on effectiveness of internet advertising;research on routing selection algorithm based on genetic algorithm;discriminative novel information detection of query-focused update summarization;core image coding based on
In the paper an internetbased massive experiment devoted to subjective assessment of images quality is described. The investigations have been based on DSIS method with some modifications induced by the nature of Int...
详细信息
In the paper an internetbased massive experiment devoted to subjective assessment of images quality is described. The investigations have been based on DSIS method with some modifications induced by the nature of internet poll. Special measures have been undertaken for removing results given by incompetent experiment participants. The huge number of tests allowed for multi-aspect image quality evaluation: 12 deformation effects have been applied to 22 images. The results point at important problems linked with automation of image quality assessment: factors determined by high levels of human visual cognition (e.g. face deformation), surprisingly high impact of local distortions on scores for some tested images, finally, correct modeling of low-level effects, like masking.
Feature extraction in brain-computer interface (BCI) work is an important task that significantly affects the success of brain signal classification. In this paper, a feature extraction method of electroencephalograph...
详细信息
In view of the question that traditional significant wave height inversion method of ocean wave don't have high precision and its applicable scope is limited, a significant wave height inversion method based on ra...
详细信息
暂无评论