In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primar...
详细信息
ISBN:
(纸本)9781467321112
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primary methods to make the morphing based information hiding technology practically useful is interactive evolutionary algorithm (IEA). When using IEA, however, the user who is rating the images for their naturalness must rate a large amount of images. During this period of time, it is possible for the user to subconsciously shift the rating criteria, thus skewing the results of the algorithm. To help solve this problem, we propose a k-nearest neighbor (k-NN) reminder, which analyzes the user's previous inputs and creates an estimated fitness rating for images to aid the user in grounding his or her ratings. We ran experiments testing the differences in using the IEA with and without the k-NN reminder, looking to see what impact the algorithm had on the speed of the analysis and the ease of the user's rating ability. Results show that in many instances, the k-NN makes it easier for the user to maintain a standard criterion for the rating of images, with no noticeable impact on the speed of the process.
This paper aims at investigating a novel solution to the problem of defect detection from the images of woven fabric. Automated visual inspection systems are an attractive alternative to human visual inspection in the...
详细信息
This paper aims at investigating a novel solution to the problem of defect detection from the images of woven fabric. Automated visual inspection systems are an attractive alternative to human visual inspection in the textile industry, especially when the quality control of products in the industry is a significant problem. In manual fault detection systems with trained inspectors, very less percentage of the defects are being detected, and thus insufficient and costly. Therefore, automated visual inspection systems are a long felt need in the textile industry. The development of an automated web inspection system requires robust and efficient fabric defect detection techniques. For the detection of fabric defects, the pre-processed image is decomposed into its bit planes. The lower order bit planes are found to carry significant information of the location and shape of defects. Then we find the exact location by means of weighted morphology. The algorithm has been evaluated on a subset of TILDA 1 image database with various visual qualities. Robustness with respect to the changes in parameters of the algorithm has been examined. The test results obtained exhibit accurate defect detection with low false alarms, thus showing the effectiveness and robustness of the proposed detection scheme.
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t...
详细信息
Production level software applications consist of thousands lines of source code. Although, the "main information" is captured by a small amount of code, it must be restated and extended on multiple places a...
详细信息
Production level software applications consist of thousands lines of source code. Although, the "main information" is captured by a small amount of code, it must be restated and extended on multiple places as it is used for interaction among components or for user interface visualization. Restated information leads to code dependency, complex maintenance efforts and increased potential for errors. Even in modern frameworks it is a common practice to restate and enhance information among components. In this paper we suggest that the main information is captured only once and components that need to restate it are generated from the machine-driven source code inspection. In this approach inspection gathers information that is supplied to extension components in the transformation process. Extension components are reused throughout the transformation and thus farther reduce duplication. Benefits of the approach are reduction of duplicates, error and inconsistency avoidance and reduced efforts in development and maintenance.
A trimaran is a multihulled boat consisting of a main hull and two smaller outrigger hulls, attached to the main hull with lateral struts. There have been many studies highlighting that a trimaran takes many advantage...
详细信息
ISBN:
(纸本)9781467308298
A trimaran is a multihulled boat consisting of a main hull and two smaller outrigger hulls, attached to the main hull with lateral struts. There have been many studies highlighting that a trimaran takes many advantages over other types of hulls especially the roll performance, because of the greater resistance to rolling that the outrigger hulls offer. In order to study the rolling motion of a trimaran, an accurate roll motion model is needed. The rolling motion of a trimaran is inherently nonlinear due to both nonlinearities in the restoring moment and damping moment. This paper presents an estimation method to predict the linear and nonlinear roll damping parameters based on free roll decay experiments of a trimaran, whose outrigger hulls are movable both along the longitudinal and transverse direction. The estimation method is based on least square support vector regression (LS-SVR) theory. In order to verify the performance of this new estimation method, the least square (LS) estimation method is also applied to identify the parameters. Both methods show satisfying performances, however models generated by LS-SVR shows less accumulated errors than models generated by LS.
It is common practice for requirements traceability research to consider method call dependencies within the source code (e.g., fan-in/fan-out analyses). However, current approaches largely ignore the role of data. Th...
详细信息
It is common practice for requirements traceability research to consider method call dependencies within the source code (e.g., fan-in/fan-out analyses). However, current approaches largely ignore the role of data. The question this paper investigates is whether data dependencies have similar relationships to requirements as do call dependencies. For example, if two methods do not call one another, but do have access to the same data then is this information relevant? We formulated several research questions and validated them on three large software systems, covering about 120 KLOC. Our findings are that data relationships are roughly equally relevant to understanding the relationship to requirements traces than calling dependencies. However, most interestingly, our analyses show that data dependencies complement call dependencies. These findings have strong implications on all forms of code understanding, including trace capture, maintenance, and validation techniques (e.g., information retrieval).
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
We present an approach to model hardware configurations of complex manufacturing systems such as ASML's lithography machines. These hardware configurations consist of actuator and sensor elements which are control...
详细信息
We present an approach to model hardware configurations of complex manufacturing systems such as ASML's lithography machines. These hardware configurations consist of actuator and sensor elements which are controlled by system software that consists of over 35 million lines of code. To minimize the cost of testing and system integration, software simulators of hardware configurations are used-acting as virtual hardware platforms on which the real control software can be executed and tested. An important aspect in such simulation and testing is material flow (specifically wafer flow) in the machine. To support the effective and efficient realization of simulators covering material flow, we defined a domain specific language (DSL) for modelling the hardware configurations to be simulated, and used a model-driven engineering approach to generate the software components implementing the simulators. The DSL can be used to specify not only nominal (i.e. good weather) behaviour but also simulation based fault injection scenarios. The overall approach reduces the cost of early hardware-software integration and enables simulating scenarios that cannot be executed on real machines because they are difficult or hazardous to carry out.
Healthcare targeted for home activity is playing an important role in our daily lives as the number of elderly person is increasing sharply. Researches pointed out that one third of 65-and-over aged person fall per-ye...
详细信息
Healthcare targeted for home activity is playing an important role in our daily lives as the number of elderly person is increasing sharply. Researches pointed out that one third of 65-and-over aged person fall per-year. Some detection related work made use of accelerometers or gyroscopes, some use passive infrared or acoustic sensors. But there were some false alarms. Falls can be an unpredicted and dangerous event. A system based on wireless sensor networks to detect the falls for old and resident was proposed in this paper. We provided a method to minimize the false alarm rate of fall detection as well. Besides, we can detect falls that did not trigger the alarm which was intervened by outside forces.
In the decade following the completion of the Human Genome Project in 2000, the cost of sequencing DNA fell by a factor of around a million, and continues to fall. Applications of sequencing in health include precise ...
详细信息
暂无评论