A new visual cryptography scheme of two secret images, which is named the shift visual cryptography of two secret images, is given. The compound function family of a general construction model is also introduced. The ...
详细信息
A new visual cryptography scheme of two secret images, which is named the shift visual cryptography of two secret images, is given. The compound function family of a general construction model is also introduced. The uniqueness and validity of this model are proved, and the minimum rows and columns for realizing the scheme are obtained. Compared with visual cryptography of one secret image, the shift visual cryptography scheme can share two secret images with the same size of pixels expansion without losing the contrast. It has randomness and various forms, and furthermore, we can also visually recover two secret images even if the two shares are different in form and color.
Texture provides a very useful cue for retrieving images from a database. Many objects can be recognized based on their distinctive texture patterns. In this paper, we propose a new method, called the regularized simu...
详细信息
ISBN:
(纸本)2726112420
Texture provides a very useful cue for retrieving images from a database. Many objects can be recognized based on their distinctive texture patterns. In this paper, we propose a new method, called the regularized simultaneous autoregressive method (RSAR), for texture classification and segmentation. The usual approach is the LSE method. But we observe that LSE is unstable in practical applications. To overcome this shortcoming, we introduce the regularization technique, i.e., the new method uses the basic SAR model and add a regularization term. With this technique, experiments are given to show the new algorithm RSAR outperforms the traditional algorithm LSE for classification and segmentation of the textured images.
The phenomenal increase in the amounts of network security data are due to the hacker attacks, virus, worm and Shapper etc. Network security log file databases are very important in computer forensics. From researches...
详细信息
ISBN:
(纸本)7563506861
The phenomenal increase in the amounts of network security data are due to the hacker attacks, virus, worm and Shapper etc. Network security log file databases are very important in computer forensics. From researches, a lot of data mining methods have been found, such as content-based queries and similarity searches to manage and use such data. Fast and accurate retrievals for content-based queries are crucial for such numerous database systems to be useful. In this paper, a new method is provided to analyze and mine this kind of time-serial database. We first signalize the NSD databases, then we use these wavelet based transform to analyze the NSD and get the periodic law of intrusion event.
The phenomenal increase in the amounts of network security data are due to the hacker attacks, virus, worm and Slapper etc. Network security log databases are very important in intrusion detection and computer forensi...
详细信息
ISBN:
(纸本)0780378652
The phenomenal increase in the amounts of network security data are due to the hacker attacks, virus, worm and Slapper etc. Network security log databases are very important in intrusion detection and computer forensics. A lot of data mining methods to research it have been found. Fast and accurate retrievals for content-based queries are crucial for such numerous database systems to be useful. In this paper, a new method is provided to analyze and mine this kind of time-serial database. After signalize the NSD databases, we first represent a DWT wavelet transform analysis algorithm, then present two wavelet-based algorithms GET/spl ***/INDICES and QUERY for querying the complex and numerous NSD, and finally give the experimental result using these algorithms.
Presents a class of modified parallel Rosenbrock methods (MPROW) which possesses more free parameters to improve further the various properties of the methods and will be similarly written as MPROW. Information on par...
详细信息
Presents a class of modified parallel Rosenbrock methods (MPROW) which possesses more free parameters to improve further the various properties of the methods and will be similarly written as MPROW. Information on parallel Rosenbrock methods; Convergence and stability analysis; Discussion on two-stage third-order methods.
A class of parallel Rosenbrock methods for differential algebraic equations are presented in this paper. The local truncation errors are defined and the order conditions are established by using the DA-trees and DA-se...
详细信息
A class of parallel Rosenbrock methods for differential algebraic equations are presented in this paper. The local truncation errors are defined and the order conditions are established by using the DA-trees and DA-series. The paper also deals with the convergence of the parallel Rosenbrock methods for h -> 0 and states the bounds for the global errors of the methods. Some particular methods are obtained by solving the order equations and a numerical example is given, from which the theoretical orders are actually observed.
A new method of adaptable rendering for interaction in Virtual Environment(VE) through different visual acuity equations is proposed. An acuity factor equation of luminance vision is first given. Secondly, five equati...
详细信息
A new method of adaptable rendering for interaction in Virtual Environment(VE) through different visual acuity equations is proposed. An acuity factor equation of luminance vision is first given. Secondly, five equations which calculate the visual acuity through visual acuity factors are presented, and adaptive rendering strategy based on different visual acuity equations is given. The VE system may select one of them on the basis of the host’s load, hereby select LOD for each model which would be rendered. A coarser LOD is selected where the visual acuity is lower, and a better LOD is used where it is higher. This method is tested through experiments and the experimental results show that it is effective.
Error analysis methods in frequency domain are developed in this paper for determining the characteristic root and transfer function errors when the linear multipass algorithms are used to solve linear differential **...
详细信息
Error analysis methods in frequency domain are developed in this paper for determining the characteristic root and transfer function errors when the linear multipass algorithms are used to solve linear differential *** relation between the local truncation error in time domain and the error in frequency domain is established, which is the basis for developing the error estimation methods. The error estimation methods for the digital simulation model constructed by using the Runge-Kutta algorithms and the linear multistep predictor-corrector algorithms are also given.
A class of parallel Rosenbrock methods for differential algebraic equations are presented in this paper. The local truncation errors are defined and the order conditions are established by using the DA-trees and DA-se...
A class of parallel Rosenbrock methods for differential algebraic equations are presented in this paper. The local truncation errors are defined and the order conditions are established by using the DA-trees and DA-series. The paper also deals with the convergence of the parallel Rosenbrock methods for h → 0 and states the bounds for the global errors of the methods. Some particular methods are obtained by solving the order equations and a numerical example is given, from which the theoretical orders are actually observed.
In this paper a class of real-time parallel modified Rosenbrock methods of numerical simulation is constructed for stiff dynamic systems on a multiprocessor system, and convergence and numerical stability of these met...
详细信息
In this paper a class of real-time parallel modified Rosenbrock methods of numerical simulation is constructed for stiff dynamic systems on a multiprocessor system, and convergence and numerical stability of these methods are discussed. A-stable real-time parallel formula of two-stage third-order and A(α)-stable real-time parallel formula with o ≈ 89.96° of three-stage fourth-order are particularly given. The numerical simulation experiments in parallel environment show that the class of algorithms is efficient and applicable, with greater speedup.
暂无评论