Congestion is still a great problem which Internet faces. Locating congestion links is very important to execute traffic engineering and mitigate network congestion. Firstly,congestion localization model was presented...
详细信息
ISBN:
(纸本)9781424442232
Congestion is still a great problem which Internet faces. Locating congestion links is very important to execute traffic engineering and mitigate network congestion. Firstly,congestion localization model was presented. After introducing AS performance matrix model, a kind of congestion detection algorithm based on threshold was put forward. Combining AS performance matrix with topology information, congested link localization algorithm was put forward. Simulation results show the algorithm has higher detection rate and lower false positive rate under different topology sizes and congestion levels.
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porch, dining hall, corridor, garage or b...
详细信息
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porch, dining hall, corridor, garage or backyard within a digital home are first captured using a web camera attached to a hyperbolic optical mirror. The captured scenes are then fed into a laptop computer for image processing and alarm purposes. Log-polar mapping is proposed to map the captured omnidirectional image into panoramic image, hence providing the observer or image processing tools a complete wide angle of view. A trespasser detection algorithm is also designed for trespasser detection purpose. The observed significances of this new proposed surveillance system include: it can cover a wide angle of view (360deg omnidirectional), small in size, low cost, lightweight, output images are with higher data compression, and accurate trespasser detection.
In general, the scanned image of two dimension barcode is usually skew. In order to recognize two dimension barcode correctly, the skew angle of two dimension barcode must be detected and corrected firstly. In this pa...
详细信息
In general, the scanned image of two dimension barcode is usually skew. In order to recognize two dimension barcode correctly, the skew angle of two dimension barcode must be detected and corrected firstly. In this paper, the edge profile of two dimension barcode is extracted and the feature points are saved at first. Then the Least Square Methods is used to synthesize these features points to a straight line in order to get the skew angle and correct them. Experimental results show that this algorithm is fast and strong anti-noise. The identification and recognition rate for the two-dimension barcode is increased effectively.
A dynamic tracing algorithms for the detection of industrial sewing machines on images sequences from a high-speed camera is presented. First, feature extraction is completed with the Harris Corner detection Algorithm...
详细信息
A dynamic tracing algorithms for the detection of industrial sewing machines on images sequences from a high-speed camera is presented. First, feature extraction is completed with the Harris Corner detection algorithms based on the change of intensity; Then the prediction of the move tendency of the corners with Extended Kalman Filter is accomplished; By using of the Neighborhood Matching algorithms the paths of the component tracked is obtainable finally . The Harris Corner detection algorithms has the properties of translation, rotation and scaling invariance and high precision, the Neighborhood Matching algorithms has the advantage of low computational complexity , the combination with Extended Kalman Filter increase the efficiency and the accuracy of the system. Experimental results show that it have a good performances in the problem proposed.
Translation-based steganography (TBS) is a kind of famous text steganography. In this paper, we examine the robustness of TBS and give an effective detection algorithm for TBS. Our algorithm can not only distinguish b...
详细信息
Translation-based steganography (TBS) is a kind of famous text steganography. In this paper, we examine the robustness of TBS and give an effective detection algorithm for TBS. Our algorithm can not only distinguish between natural language text and stego-text which was generated by TBS, but also can distinguish between machine translated text and stego-text. The detection accuracy increases as the text size increases. When the text size is larger than 60 sentences, the detection accuracy is greater than 92%.
Recommender systems could be applied in grid environment to help grid users select more suitable services by making high quality personalized recommendations. Also, recommendation could be employed in the virtual mach...
详细信息
ISBN:
(纸本)9780769537580
Recommender systems could be applied in grid environment to help grid users select more suitable services by making high quality personalized recommendations. Also, recommendation could be employed in the virtual machines managing platform to measure the performance and creditability of each virtual machine. However, such systems have been shown to be vulnerable to profile injection attacks (shilling attacks), attacks that involve the insertion of malicious profiles into the ratings database for the purpose of altering the system's recommendation behavior. In this paper we introduce and evaluate a new trust-based detecting algorithM for protecting recommender systems against profile injection attacks. Moreover, we discuss the combination of our trust-based metrics with previous metrics such as RDMA in profile-level and item-level respectively. In the end, we show these metrics can lead to improved detecting accuracy experimentally.
The method described in this paper deals with the problems of T-wave detection in ECG signals. Determining the position of a T-wave can be complicated, due to the ambiguous and changing form of the complex and the pre...
详细信息
The method described in this paper deals with the problems of T-wave detection in ECG signals. Determining the position of a T-wave can be complicated, due to the ambiguous and changing form of the complex and the presence of noise. We developed a method to detect T-waves in noisy signals. The performance of the proposed method was tested on 33 records of the MIT/BIH Arrhythmia Database resulting in 0.48% incorrectly detected T waves.
The guarantee technology of MAC quality of service (QoS) for wireless mesh network is proposed in this paper. While the MAC protocol of IEEE 802.16 mesh mode has provided a good framework for QoS guarantee, there is n...
详细信息
ISBN:
(纸本)9781424448166
The guarantee technology of MAC quality of service (QoS) for wireless mesh network is proposed in this paper. While the MAC protocol of IEEE 802.16 mesh mode has provided a good framework for QoS guarantee, there is not a detailed standard for the resource scheduling algorithm in the MAC protocol. So further development is left to designers. According to the characteristics of WMN, this paper presents a resource scheduling algorithm. Also, the paper designs a new congestion detection module in MAC layer. With the help of the new congestion detection module, the congestion handling capacity of the network is improved and QoS guarantee mechanism is enhanced. To evaluate the performance of the algorithm, a simulation platform is set and implemented. The simulation results show that the new resource scheduling algorithm and congestion detection algorithm not only ensure the service priority of real-time operation but also improve the resource utilization and the network throughput.
The capability of anti-islanding protection is a very important requirement for distributed generators (DG). A power line signaling based scheme for anti-islanding protection has been proposed in a companion paper. In...
详细信息
ISBN:
(纸本)9781424445080;9781424445097
The capability of anti-islanding protection is a very important requirement for distributed generators (DG). A power line signaling based scheme for anti-islanding protection has been proposed in a companion paper. In the scheme, a signal generated by power electronics is injected from a central upstream location to the DG sites. The lack of a signal at the DG site indicates that the DG is islanded. This paper is a summarization of extensive field test for the proposal. Two proposed detection algorithms have been verified, the impact of firing angles on signal strength have been determined and the effect of power system frequency drift have been analyzed. The test results proved that the proposed scheme is promising for the anti-islanding protection of distributed generator.
The key of intelligent infusion system is to detect liquid level of infusion bottle fast and accurately. We proposed an automatic detection algorithm of liquid level of infusion bottle based on image processing, by de...
详细信息
ISBN:
(纸本)9781424449934
The key of intelligent infusion system is to detect liquid level of infusion bottle fast and accurately. We proposed an automatic detection algorithm of liquid level of infusion bottle based on image processing, by designing edge detection, binarization, filtering, image projection and motion detection to realize automatic liquid level detection. The algorithm has the advantages of stable noise-resistance, rapidity and simplicity, etc. Experimental results of the algorithm show that the algorithm is effective and feasible.
暂无评论