Content based image retrieval is a challenging issue in management of existing large digital image libraries and databases. The accuracy of image retrieval methods is subject to effective extraction of image features ...
详细信息
Content based image retrieval is a challenging issue in management of existing large digital image libraries and databases. The accuracy of image retrieval methods is subject to effective extraction of image features such as color, texture, and shape. In this paper we propose a new image retrieval method using contourlet transform coefficients. We use the properties of contourlet coefficients to assign the normal distribution function to the distribution of coefficients in each sub-band. The assigned normal distribution functions are used to extract the texture feature vector at the next stage. Simulation results indicate that the proposed method outperforms other conventional texture image retrieval methods such as, Gabor filter and wavelet transform. Moreover, this method shows a noticeable higher performance compared to another contourlet based method.
Right now,in most of the countries,inside the people’s wallet,they probably have a couple of credit cards,an identification card,automatic machine teller cards(ATM card),and maybe a few other plastic *** realizing it...
详细信息
Right now,in most of the countries,inside the people’s wallet,they probably have a couple of credit cards,an identification card,automatic machine teller cards(ATM card),and maybe a few other plastic *** realizing it,these plastic cards have become a very important part of their *** smart card technology improves security and convenient but it is not used in a wide range in Middle East *** acceptance is vital for further development of any fresh technology and smart card technology as *** of the factors that can effect on the acceptance of smart card technology is users’*** goal of this study is to present a general overview of smart card technology and identify the smart card’s benefits,features and characteristics and moreover,the level of users’knowledge and awareness about smart card technology will be *** order to achieve this goal,a survey was conducted among the international students of University Technology Malaysia to measure their awareness of smart card technology.
This paper is a continuation regarding the proposed architecture on multimodality discussed by Armoogum et al. It proposes further enhancements on the current architecture and explores other possibilities regarding it...
详细信息
This paper is a continuation regarding the proposed architecture on multimodality discussed by Armoogum et al. It proposes further enhancements on the current architecture and explores other possibilities regarding its application in Mauritius. The enhanced architecture for multimodality is deployed on a 3G network instead using of only conventional GSM network and local phones line. This give rises to various possibilities such as MMS, real time video transmission, client application on Symbian phones with high volume of data transmission.
In this study, we proposed a powder-layered manufacturing process, a type of rapid prototyping technique, to produce desired bone shapes for transplants using biomaterial powder. In the experiments, we used convention...
详细信息
In this study, we proposed a powder-layered manufacturing process, a type of rapid prototyping technique, to produce desired bone shapes for transplants using biomaterial powder. In the experiments, we used conventional inkjet-type equipment and orthopedic filling-paste powder (BIOPEX), mainly containing alphatribasic calcium phosphate as the forming material. To solidify the powder, we used a sodium chondroitin sulfate? dibasic sodium succinate anhydride aqueous solution as the binder liquid. This paper discusses the results of investigations on the internal and surface chemical characteristics of formed artificial bones, formed artificial bones hardened by immersion process, and paste type artificial bones used in clinical applications, to determine the suitability of the immersion conditions. The bones were immersed for five hours in immersion fluid made of water and binder liquid at 90 °C?To analyze the chemical constituent, X-ray diffraction and X-ray photoelectron spectroscopy were used. The results showed that the hydrate reaction caused by the application of the binder fluid during forming enhances hydroxyapatite (HA) concentration by about 6.5 times. With samples immersed in water, HA was found internally as well as from the surface, the quantity of which was about 80?, 11 times more than conventional paste type artificial bone. On the other hand, with the samples immersed in the binder fluid, no HA crystals were detected internally. The percentages of P and Ca present on the surface were minute. Given the high quantities of C, O, and Na present, the immersion process is thought to have formed a thin layer of binder fluid. These results from the experimental samples indicate that immersion in binder fluid which showed no problems in terms of chemistry and strength is most appropriate for clinical applications.
Performance evaluation is a serious challenge in designing or optimizing reconfigurable instruction set processors. The conventional approaches based on synthesis and simulations are very time consuming and need a con...
详细信息
ISBN:
(纸本)9781424427482
Performance evaluation is a serious challenge in designing or optimizing reconfigurable instruction set processors. The conventional approaches based on synthesis and simulations are very time consuming and need a considerable design effort. A combined analytical and simulation-based model (CAnSO*) is proposed and validated for performance evaluation of a typical reconfigurable instruction set processor. The proposed model consists of an analytical core that incorporates statistics gathered from cycle-accurate simulation to make a reasonable evaluation and provide a valuable insight. Compared to cycle-accurate simulation results, CAnSO proves almost 2% variation in the speedup measurement.
In this paper,we prove the optimality of disturbance-affine control policies in the context of onedimensional,box-constrained,multi-stage robust *** results cover the finite horizon case,with minimax(worstcase) object...
详细信息
In this paper,we prove the optimality of disturbance-affine control policies in the context of onedimensional,box-constrained,multi-stage robust *** results cover the finite horizon case,with minimax(worstcase) objective,and convex state costs plus linear control *** proof methodology,based on techniques from polyhedral geometry,is elegant and conceptually simple,and entails efficient algorithms for the case of piecewise affine state costs,when computing the optimal affine policies can be done by solving a single linear program.
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin...
详细信息
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to higher learning institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI information technology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next ...
详细信息
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next to it. We perform experiments on uniformly distributed random datasets to compare our algorithm with the standard SvS. We use regression analysis to get an equation for determining an appropriate skipping number. Our results show that the skipping SvS algorithm using the equation obtained can reduce approximately 41% on the number of comparisons of the standard SvS algorithm.
The Italica Project is the implementation of an electronic health record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a medical signal grid repository module and its int...
详细信息
The Italica Project is the implementation of an electronic health record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a medical signal grid repository module and its integration to the Italica Project. We also describe the architecture of that module and explain the design decisions taken for its construction. The integration to the preexisting system is also presented, together with the difficulties that arose from the insertion of a data grid in an environment not used to this technology. Several issues about the security and reliability of the medical data are treated as well. In this paper we also discuss the use of the grid repository as a starting point for the development of distributed processing applications.
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of...
详细信息
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
暂无评论