Reversible data hiding (RDH) is one special type of data hiding, and is widely used for many intended applications. Moreover, to protect the cover image, RDH in encrypted image (RDHEI) is accordingly proposed. With th...
详细信息
Improvements to a scanning electron beam annealer are reported which allow high temperature anneals on semiconductor samples to be carried out in less than one second. These improvements will allow the study of fast a...
详细信息
Improvements to a scanning electron beam annealer are reported which allow high temperature anneals on semiconductor samples to be carried out in less than one second. These improvements will allow the study of fast annealing effects such as dopant activation, precipitation and enhanced diffusion. The wide range of temperature-time (T(t)) schedules now possible together with accurate T(t) measurements make this simple machine ideal for use in rapid thermal annealing research. An example of an enhanced diffusion study for boron and arsenic in silicon is described.
utilize web and database technology to construct a Journal-Based Portfolios Assessment system to realize a Legitimate Peripheral Participation (LPP)[1] learning community. In this system, we divide system to three lay...
详细信息
ISBN:
(纸本)0769519679
utilize web and database technology to construct a Journal-Based Portfolios Assessment system to realize a Legitimate Peripheral Participation (LPP)[1] learning community. In this system, we divide system to three layer, the view layer present data by Oracle Portal Server, Data layer store data by Oracle Database Server and Operating Control layer operate workflow by Oracle Database trigger and job Data analysis and questionnaire indicates that Web Journal is effective to promote knowledge exchange, Student can improve learning performance and it can form a LPP structure The purpose of using the journal approach[2] is to emulate the forming of academic societies formed by journals. At the same time, the achievement of students in a course is based on their publications in journals and the positions they played in the journals. First, students submit their work such as homeworks, learning portfolios, reports of organizing contents in the discussion, learning problems, related websites. Each submitted article would be assessed by three peers Then the reviewers will review the submitted works. The reviewers will give comments to students. The journal system will publish good articles. Articles published include submitted works and reviewer's comments hoping that students will contribute and exchange their knowledge.
The performance of a computer network is commonly measured by the maximum minimum time required to move a certain amount of data between any 2 nodes in the network. Due to the advances in technology, certain links in ...
详细信息
The performance of a computer network is commonly measured by the maximum minimum time required to move a certain amount of data between any 2 nodes in the network. Due to the advances in technology, certain links in the network may be upgraded, for instance to optical fibre links, so that better performance can be achieved. In this paper, we study the LINK UPGRADE problem for networks. We first show that the LINK UPGRADE problem is script N sign℘-complete. We also show that, a closely related problem, the MINIMUM COST LINK UPGRADE problem is script N sign℘-complete even if the underlying topology of the network is a linear array. However, for certain classes of networks, the LINK UPGRADE problem can be solved in polynomial time. For general networks, we provide effective heuristics for the above problems.
The k-Secure t-Conference key distribution scheme (kStC-KDS) provides dynamic conferences in wireless sensor networks, which any group of t sensor nodes can derive a conference key using only its pre-distributed piece...
详细信息
A unified framework is given for the specification of external consistency constraints, integrity constraints, and temporal consistency constraints of a real-time distributed database system. The formalism is event ba...
详细信息
In view of the time uncertainty of maintaining activities and fuzzy mathematical rules with complexity and difference in traditional fuzzy Petri net, the simulation model is proposed based on fuzzy simulation and Colo...
详细信息
Fragile watermarking is the task of embedding a watermark in an image such that even small changes, called tamper, in the image can be detected or even recovered to preserve unauthorized alteration. A well-known type ...
详细信息
In recent years, NVIDIA proposed a developing platform for GPGPU. They also extended C language to parallel computing language, CUDA. In the meanwhile, the growth of memory capacity inside a computer enhances the feas...
详细信息
We describe a successful implementation of a theorem prover for modal logic S4 that runs on a Java smart card with only 512 KBytes of RAM and 32KBytes of EEPROM. Since proof search in S4 can lead to inf.nite branches,...
详细信息
暂无评论