In order to overcome the shortcomings of Garcia's watermarking algorithm, an improved adaptive synchronous audio watermarking algorithm is proposed. In this algorithm, both the psychoacoustic model and the auditor...
详细信息
In order to overcome the shortcomings of Garcia's watermarking algorithm, an improved adaptive synchronous audio watermarking algorithm is proposed. In this algorithm, both the psychoacoustic model and the auditory masking threshold are used to determine the embedding positions of watermarking for the purpose of ensuring the imperceptibility of watermarking, the synchronization code is embedded in die audio signal in time domain to withstand synchronous attacks, and the audio signal is segmented and the watermarking is self-adaptively embedded in each segment. Moreover, a sequence number is embedded in the front of each segment to discriminate different segments. Experimental results show that the proposed algorithm is robust against synchronous attacks and effective in processing common audio signals, and that it obviously improves the imperceptibility of watermarking.
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfe...
详细信息
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfeit imposes a menace to industry worldwide, and the problem is not specific for certain products or countries. In 2003, Koh et al. describe a RFID system based on "track and trace" solution to apply into pharmaceutical supply chain management to fight the counterfeit. Moreover, there are applications to solve malicious manner were presented. But there always still existed some disputes and not conform Class 1 Generation 2 (C1G2) standards. Unfortunately, the trick is changeable. The Koh et al.'s scheme is at premise rather primitive. In order to tackle this problem, we propose an anti-counterfeit ownership transfer protocol for low cost RFID system. We only use a tag to be a storage media. The proposed scheme can ensure a secure transaction.
Large temperature drift is an important factor for improving the performance of FOG.A trend term of temperature drift of FOG is obtained using stationary wavelets transform,and an FOG drift algorithm with least square...
详细信息
Large temperature drift is an important factor for improving the performance of FOG.A trend term of temperature drift of FOG is obtained using stationary wavelets transform,and an FOG drift algorithm with least squares wavelet support vector machine(LS-WSVM) is *** algorithm used Maxihat wavelet as a kernel function of LS-WSVM to establish an FOG drift *** has better modeling precise than LS-WSVM model with Gauss *** indicate the efficiency of this algorithm of LS-WSVM.
A novel Lagrangian "individual-based" isotropic continuous time exponential type swarming model with a family of attraction/repulsion function is proposed in this article. The stability of aggregating behavi...
详细信息
As one of swarm intelligence optimization algorithms, the stochastic diffusion search is characterized by partial function evaluation and one-to-one recruitment mechanism. These characteristics make the algorithm high...
详细信息
As one of swarm intelligence optimization algorithms, the stochastic diffusion search is characterized by partial function evaluation and one-to-one recruitment mechanism. These characteristics make the algorithm high computation efficiency and robustness of the stochastic diffusion search. Based on the survey of basic principles and the research actuality of stochastic diffusion search, the existing problem and features are analyzed, and some future research directions about the stochastic diffusion search are delineated.
Virtualization technologies are becoming more and more widely used in the distributed computing area. In order to organize and manage various virtual machines in the SOA (Service Oriented Architecture) environment mor...
详细信息
Virtualization technologies are becoming more and more widely used in the distributed computing area. In order to organize and manage various virtual machines in the SOA (Service Oriented Architecture) environment more effectively, a virtualization management system called SOAVM is proposed and demonstrated in this paper. SOAVM addresses the limitation of virtual appliances in software quantities by employing ACS (Automated Configuration Service). ACS provides a more flexible way to conduct automated software configuration on virtual machines compared to the traditional virtual appliance pattern. The system framework is designed, which defines all functions of SOAVM as services to comply with SOA. Then the system design is described, illustrating how ACS works. Furthermore, critical implementation issues are discussed in detail, which demonstrates that SOAVM is a feasible and efficient virtualization management system.
As we are moving along with emerging technologies the storage of data will no longer be in our conventional single dimensional raw data. The relational data can be further identified with spatial and non-spatial relat...
详细信息
ISBN:
(纸本)9780863418877
As we are moving along with emerging technologies the storage of data will no longer be in our conventional single dimensional raw data. The relational data can be further identified with spatial and non-spatial relationship. This is to examine whether clustering approach has any role to play in spatial data mining. This paper explains spatial clustering under statistical method of analysis for discovering the knowledge which is encapsulated in the spatial database. This study emphasis the spatial clustering approach accomplished through algorithms such as PAM and CLARA and let us to come across the limitations of PAM method. To the end, This work ushers that spatial data mining is a promising field, with fruitful research results and carries many challenging issues.
Traditional text classification model uses statistical methods to obtain features. But in the aspect of discrimination domain and non-domain text category, domain knowledge relations haven't been taken account of ...
详细信息
Traditional text classification model uses statistical methods to obtain features. But in the aspect of discrimination domain and non-domain text category, domain knowledge relations haven't been taken account of in these methods. A domain text classification model was presented in this paper. This model used the support vector machine learning algorithm, gained domain classification feature words through statistic and union domain words, structured domain classification feature space. With the help of domain knowledge relations, computed relevance between domain concepts, got domain classification feature weight. Finally domain text classification was realized. An experiment in the Yunnan tourism domain was carried on to confirm that domain knowledge relations have a good influence on the domain text classification. The classification accuracy rate has been increased 0.04 than improved TFIDF method.
Recently, combining a video recording of a presentation along with the digital slides used in it has become popular in e-learning and presentation of archives. For users of the archives, it is useful to preview a dige...
详细信息
Recently, combining a video recording of a presentation along with the digital slides used in it has become popular in e-learning and presentation of archives. For users of the archives, it is useful to preview a digest of such content to grasp the atmosphere and/or an outline of the presentation. This paper proposes a method of automatic digest generation by extracting important scenes from the presentation content. The extracted scenes are chosen based on several factors such as frequency and specificity of words, scene duration and order. Finally, the effectiveness of the proposed methods are evaluated by comparing with testers' answer sets for actual lectures.
Outdoor discrimination of fruits based on image processing technology is worth studying. Previous studies and technologies are discussed, then a new technology based on region features, which taken tomato as subject, ...
详细信息
Outdoor discrimination of fruits based on image processing technology is worth studying. Previous studies and technologies are discussed, then a new technology based on region features, which taken tomato as subject, is presented. The discriminating process includes gray transformation, region edge enhancement, region segmentation and other process. 70 images are tested with the technology and the result shows a 74.3 percent accuracy. Reasons for wrong discriminating are then analyzed and solutions are given. Further tests also prove the new technology is applicable to discriminate other similar fruits by adjusting the gray transformation formula.
暂无评论