Digital image watermarking protects content by embedding a signal (i.e., owner information) into the host image without noticeable degradation in visual quality. To develop any image watermarking scheme, there some im...
Digital image watermarking protects content by embedding a signal (i.e., owner information) into the host image without noticeable degradation in visual quality. To develop any image watermarking scheme, there some important requirements should be achieved such as imperceptibly, robustness, capacity, security, and, etc. Generally, the watermarking scheme based on wavelet transform domain shows an advantage in human perception and good imperceptibility and robustness. Due to this fact, this paper presents two blind image watermarking schemes based on DWT-SVD and RDWT-SVD. To evaluate their performance, these schemes are exposed to different geometric and non-geometric attacks. Although, DWT-SVD and RDWT-SVD showed robust against all attacks, RDWT-SVD is better than DWT-SVD, especially for geometrical attacks.
Usability is one of important criteria to measure website quality. One of the approaches to measure website usability is survey using questionnaire. The aim of this study is to validate the questionnaire instrument to...
详细信息
Usability is one of important criteria to measure website quality. One of the approaches to measure website usability is survey using questionnaire. The aim of this study is to validate the questionnaire instrument to measure the highest education institution or university website in context of usability. Pre-test are used to validate the instrument for this study. The questionnaire instrument has 9 constructs and 51 item of questionnaire. 30 respondents were involved in this study. After analyzed the result, 7 items need to delete from the instrument. Apart from the more technical and general aspects the feedback from the respondents was useful in identifying problematic questions and it was suggested that some questions need to deleted as they were seen to have same meaning with other questions and too difficult to answer for several reason such as because the sentences of the question is difficult to understand and the level of understanding between the question and respondent.
The ineffectiveness of information retrieval systems often caused by the inaccurate use of keywords in a query. In order to solve the ineffectiveness problem in information retrieval systems, many solutions have been ...
详细信息
The ineffectiveness of information retrieval systems often caused by the inaccurate use of keywords in a query. In order to solve the ineffectiveness problem in information retrieval systems, many solutions have been proposed over the years. The most common techniques are revolving around query modification techniques such as query expansion, query refinement, etc. Due to the high similarity in these query modification techniques, people are often confused about their differences. However, few existing survey papers compare their differences. Hence, in this paper, we first briefly discuss the basic technique of query expansion, query suggestion and query refinement, and then make a detailed comparison between these three techniques. We finally show the promising future research trend in the field of query modification.
The Completed Local Ternary Pattern descriptor (CLTP) was proposed to overcome the drawbacks of the Local Binary Pattern (LBP). It used for rotation invariant texture classification and demonstrated superior classific...
详细信息
The Completed Local Ternary Pattern descriptor (CLTP) was proposed to overcome the drawbacks of the Local Binary Pattern (LBP). It used for rotation invariant texture classification and demonstrated superior classification accuracy with different types of texture datasets. In this paper, the performance of CLTP for image categorisation is studied and investigated. Different image datasets are used in the experiments such as the Oliva and Torralba datasets (OT8), Event sport datasets, and 2D HeLa medical images. The experimental results proved the superiority of the CLTP descriptor over the original LBP, and different new texture descriptors such as Completed Local Binary Pattern (CLBP) in the image categorisation task. In 2D HeLa medical images, the proposed CLTP achieved the highest state of the art classification rate reaching 95.62%.
The paper discusses a new technique for development of metamodels for the modelling distributed parallel softwaresystems. The approach is an important stage of Domain-Specific Mathematical Modelling (DSMM), developed...
详细信息
The paper discusses a new technique for development of metamodels for the modelling distributed parallel softwaresystems. The approach is an important stage of Domain-Specific Mathematical Modelling (DSMM), developed to enhance the methodology of Domain-Specific Modelling. The advantage of DSMM is a possibility of constructing metamodels for modelling domains, having different mathematical properties and structures. The paper analyses applicability of OWL-DL ontologies for expressing properties of softwaresystems. Identification of the metatypes as OWL classes and use of OWL restrictions as rules of metamodels' grammars give us an effective way for the design and verification of softwaresystems. The proposed approach have advantages of the model-driven software development and allows verification of softwaresystems at earlier design stage.
The paper proposes a new model, method and algorithms for processing a Subject Domain (SD). It considers an SD as a tuple (E,V,T), where E is a set of all objects of this domain, V is a set of all connections between ...
详细信息
The paper proposes a new model, method and algorithms for processing a Subject Domain (SD). It considers an SD as a tuple (E,V,T), where E is a set of all objects of this domain, V is a set of all connections between these objects, T is a set of mass problems that can be solved in this domain. Each object is represented by its essential attributes. This allows us to describe SD, to solve most of the mass problems from T, and to control a state of the domain. The goal of the paper is to develop a method and algorithms that allow us to find essential attributes of domains, described as relational databases or production systems. For a production system, we build a dependency graph with attributes as vertexes, and calculate for each of the vertexes a value that indicates how many other attributes can be found using a particular vertex. High-ranked vertexes are considered as essential. The method is based on considering as essential of the most frequently accessed attributes in a relational database. Having essential attributes of objects of a domain, it allows us to define essential attributes of the domain itself.
Due to rapid population growth, the demand for food is also elevating, which inspires farmers to embrace precision agriculture to increase production by exploiting predictive analytics on relevant real-time data. The ...
详细信息
Due to rapid population growth, the demand for food is also elevating, which inspires farmers to embrace precision agriculture to increase production by exploiting predictive analytics on relevant real-time data. The exactitude of a prediction is vital to decide the next course of actions to be taken to compensate current demands, which again relies on a competent data acquisition technique. The Media Access Control (MAC) protocols have significant contribution in designing data acquisition technique. In this paper, we propose a new Store-and-Delivery base MAC (SD-MAC) protocol for Air-Ground Collaborative Wireless Networks (AGCWNs) to acquire data efficiently from the sensing devices which are deployed in the agricultural field. Our proposed protocol takes into consideration of the factors of network architecture and transforms them into advantages to attain higher throughput. The performance of the proposed protocol is evaluated using simulations and involving another such protocol, where the proposed protocol outperforms the other protocol.
In order to investigate the terrain changed in areas of urban, vegetation, bare land, and water type mapping in Pekan, Pahang of Malaysia using Landsat data. The data of a district of educational and research on years...
详细信息
In order to investigate the terrain changed in areas of urban, vegetation, bare land, and water type mapping in Pekan, Pahang of Malaysia using Landsat data. The data of a district of educational and research on years 2000 and 2013, were analyzed. First, will evaluating the quality of the image of Landsat data. There were no obvious errors noticeable on the geometric and radiometric. In order to estimate the accuracy of the map derived from classification, a ground truth map was prepared using strip sampling on map. Image classification was performed using original and synthetic bands for following four land types: urban, water, bare land, vegetation, and cloud types. Classification was performed using maximum likelihood (ML). The highest accuracy was obtained by using ML classifier. According to the results of this study, the spectral data of Landsat data have a large potential for land type mapping in Pekan area mapping.
Smart Internet Devices (SIDs) particularly Smartphones are soon turned to be super computers, while the restricted battery timing is a focused issue which hinders the steady meeting expectations yield of these devices...
详细信息
ISBN:
(纸本)9781467395731
Smart Internet Devices (SIDs) particularly Smartphones are soon turned to be super computers, while the restricted battery timing is a focused issue which hinders the steady meeting expectations yield of these devices. In addition, various sensors, high resolution LCDs, wireless interfaces, GPS and other advanced features drain battery quickly, thus, shrinking the operational time. Subsequently, increasing battery life of SIDs has happened to dire investigation significance at hardware and programming levels, both alike. The intention of our work is to evaluate computational offloading; sending power-intensive processing to remote servers in cloud and accepting the outcome back on device's screen. Furthermore, this paper gives a review of previous research work on computational offloading. We then summarize distinct research work with their respective findings and limitations. In addition, a short critical analysis of the review works following the summarized data.
Exhaustive testing of all possible combinations of input parameter values of a large system is impossible. Here, pairwise testing technique is often chosen owing to its effectiveness for bug detection. For pairwise te...
详细信息
Exhaustive testing of all possible combinations of input parameter values of a large system is impossible. Here, pairwise testing technique is often chosen owing to its effectiveness for bug detection. For pairwise testing, test cases are designed to cover all possible pair combinations of input parameter values at least once. In this paper, we investigate the adoption of Migrating Birds Optimization (MBO) algorithm as a strategy to find an optimal solution for pairwise test data reduction. Two strategies have been proposed; the first strategy implements the basic MBO algorithm, called Pairwise MBO Strategy (PMBOS) and the second strategy implements an improved Pairwise MBO strategy, called iPMBOS. The iPMBOS enhances the PMBOS with multiple neighborhood structures and elitism. Based on the published benchmarking results, these two strategies offers competitive results with most existing strategies in terms of the generated test size. We also noted that iPMBOS outperforms PMBOS in several parameter configurations, especially when the test size generated is relatively small.
暂无评论