Biometrics are used for personal recognition based on some physiologic or behavioral characteristics. In this era, biometric security systems are widely used which mostly include fingerprint recognition, face recognit...
详细信息
Biometrics are used for personal recognition based on some physiologic or behavioral characteristics. In this era, biometric security systems are widely used which mostly include fingerprint recognition, face recognition, iris and speech recognition etc. Retinal recognition based security systems are very rare due to retina acquisition problem but still it provides the most reliable and stable mean of biometric identification. This paper presents a four stage personal identification system using vascular pattern of human retina. In first step, it acquires and preprocesses the colored retinal image. Then blood vessels are enhanced and extracted using 2-D wavelet and adaptive thresholding respectively. In third stage, it performs feature extraction and filtration followed by vascular pattern matching in forth step. The proposed method is tested on three publicly available databases i.e DRIVE, STARE and VARIA. Experimental results show that the proposed method achieved an accuracy of 0.9485 and 0.9761 for vascular pattern extraction and personal recognition respectively.
Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. H...
详细信息
Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. However, traditional access control methods can only negating or approving accesses, greatly lacking flexibility. In this paper, we introduce the disclosing degree for end-users to precisely and flexibly specify their privacy requirements. We implement a disclosing degree based scheme in the middleware Shadow for privacy protection. We also demonstrate the effectiveness of our scheme by comprehensive case-studies.
Network Virtualization paves the way for sharing the physical infrastructure with many service providers and enables resources in physical substrate network being applied and provisioned as a form of Virtual Network(V...
详细信息
ISBN:
(纸本)9781479948109
Network Virtualization paves the way for sharing the physical infrastructure with many service providers and enables resources in physical substrate network being applied and provisioned as a form of Virtual Network(VN).However,there exist many obstacles in applications of this *** problem of VN embedding is commonly considered the most difficult one of *** existing research only considers the case of how to embed VN *** user demands on Virtual Network are dynamically changing,how to efficiently reconfigure VN to adapt to changing demand is challenging *** this paper,our objective is to find way for optimally reorganize VN that already embedded on VN in a cost sensitive way to meet the changed *** address this problem by proposing a cost sensitive VN reconfiguration approach.A heuristic VN reconfiguration algorithm with virtual node and virtual link migration and swapping strategy is *** validate and evaluate the given algorithms by conducting experiments in high fidelity emulation *** evaluation results show that the proposed approach can effectively reconfigure VN while minimizing cost and fragmentation of *** comparing our algorithms with others,the given reconfiguration algorithm outperforms existing solutions.
and centralized model (CM) offspring generation models, this paper proposes to use the differential evolution (DE) algorithm as the base population reproduction method and enhance its DM scheme with one of the key CM ...
详细信息
ISBN:
(纸本)9781450319645
and centralized model (CM) offspring generation models, this paper proposes to use the differential evolution (DE) algorithm as the base population reproduction method and enhance its DM scheme with one of the key CM features, which is the covariance matrix adaptation (CMA) used in CMA-ES. In this way, an enhanced DE population reproduction scheme with evolution path (DE/EP) is developed. The proposed DE/EP scheme is kept almost as simple as the original DE but works better due to the advantages of the CMA feature.
Transmission delays, load fluctuations, and intermittent output power of renewable energy sources will all have a substantial impact on frequency stability in microgrids (MGs). In response, various types of advanced c...
详细信息
ISBN:
(数字)9798350390421
ISBN:
(纸本)9798350390438
Transmission delays, load fluctuations, and intermittent output power of renewable energy sources will all have a substantial impact on frequency stability in microgrids (MGs). In response, various types of advanced control techniques were employed to improve the performance of the load frequency control (LFC) systems. Notwithstanding this, the fragility of the current techniques makes LFC systems vulnerable to parametric (interval) uncertainties associated with communication time delay. Inspired by recent breakthroughs in robust control, in this study, we device a novel graphical tuning method of the PI controller for tackling this issue. First, we determine the shape of the value set for the characteristic function of uncertain LFC system. Then, the exposed edges are constructed to the boundary of this set under interval uncertainties. To accomplish this step and thanks to the D-decomposition method, the robust stability region in the parameter space of the controllers are determined. Our devised methodology contributes a family of robust stabilizing controllers, instead of just one, where it enables a more flexible choice for the controller parameters. The efficacy of the proposed methodology is indicated on a given single-area MG.
For the limited bandwidth and other limiting factors in the video coding, the visual quality always cannot satisfy the clients, especially the subjective visual quality. This paper proposes a novel ROI-based rate cont...
详细信息
For the limited bandwidth and other limiting factors in the video coding, the visual quality always cannot satisfy the clients, especially the subjective visual quality. This paper proposes a novel ROI-based rate control scheme for H.264/AVS, aiming at improving the subjective visual quality. In our scheme, an efficient method is presented for extracting Region-of-Interest (ROI) adaptively and exactly with introducing some new concepts. Relatively more bits are allocated to Region-of-Interest and the frames with high complexity. The extensive experimental results show that proposed rate control scheme can control bit rates more accurately and achieve better subjective visual quality than the rate control scheme JVT-G012 in the latest JVT H.264/AVC reference model JM11.0.
One of the most important work to analyze networks is community detection. We present a dynamic community discovery method based on Visibility Graph. Firstly, we put forward related definitions of Visibility Graph for...
详细信息
Web applications design methodologies hold the promise of engineering high-quality and long-lived Web systems and rich Internet applications. However, many such methodologies focus solely on green-field development, a...
详细信息
Web applications design methodologies hold the promise of engineering high-quality and long-lived Web systems and rich Internet applications. However, many such methodologies focus solely on green-field development, and do not properly address the situation of leveraging the value locked in legacy systems. This paper proposes a holistic approach to redesigning legacy applications for the Web using the ubiquitous Web applications design framework (UWA) and an extended version of its transaction design model (UWAT+). The approach blends design recovery technologies for capturing the know-how embedded in the legacy application with forward design methods particularly well suited for Web-based systems
Traditional neural fiber classification methods are generally difficult to balance classification accuracy and algorithm complexity, and there is a problem of relying on manual intervention, mainly including manual dr...
详细信息
The complex landscape of multi-cloud settings is the result of the fast growth of cloud computing and the ever-changing needs of contemporary organizations. Strong cyber defenses are of fundamental importance in this ...
详细信息
暂无评论