Barcode has been widely applied in the modern world. This paper presents a fast and robust recognition method of noisy Code 39 barcode. The proposed method can be divided into two steps: search and decoding. In the fi...
详细信息
The multi-section coupled transmission line is equivalent to the cascade of multi-section ladder impedance filters, which provides a basis for the research of broadband directional couplers and meets the needs of micr...
详细信息
Community detection is of great importance to find hidden information in complex networks. For this problem, local expansion algorithms are becoming popular due to the low time complexity. However, most of them depend...
详细信息
Aiming at the inability to reconstruct the frequency and the pattern of the traditional monopole antenna, an ultra-wideband monopole antenna with frequency reconstruction and pattern reconstruction is proposed. The an...
详细信息
In recent years, semantic search has become one hot motivation of the semantic web. In this paper, we propose a semantic-based resource management and search architecture and its implementation in research community, ...
In order to improve the accuracy of the image annotation, an automatic image annotation method based on mutual K-nearest neighbor graph(MKNN) is proposed. The peoposed algorithm describes the relationship between low-...
详细信息
The effectiveness of ad-hoc retrieval systems appears to have reached a *** the research community is investigating an assortment of variables that will help them develop increasingly accurate retrieval *** paper pres...
详细信息
ISBN:
(纸本)9780972147903
The effectiveness of ad-hoc retrieval systems appears to have reached a *** the research community is investigating an assortment of variables that will help them develop increasingly accurate retrieval *** paper presents a new method of high accuracy retrieval of document,which is based on quotient *** describes the problem space from different granularity:sentence,paragraph and document,and studies the relations among different granularities.
In the cyber-physical society, networks are constructed for information transportation. Among them, power law networks with the scale free property are extensively found in self-organized systems. The dynamicity of th...
详细信息
A novel strategy termed as mutation history learning strategy (MHLS) is proposed in this paper. In MHLS, a vector called mutation memory is introduced for each antibody and a new type of mutation operation based on mu...
详细信息
To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking sche...
详细信息
To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking scheme with superior localization, and further discusses the probability of false rejection (PFR) and the probability of false acceptance (PFA) of the proposed scheme. Moreover, four measurements are defined to evaluate the quality of a recovered image. In the proposed algorithm, the original image is divided into 2×2 blocks to improve localization precision and decrease PFR under occurrence of random tampering. The PFR under occurrence of region tampering can be effectively decreased by randomly embedding the watermark of each block in conjunction with a novel method of tamper detection. Compared with the current self-recovery fragile watermarking algorithms, the proposed scheme not only resolves the tamper detection problem of self-embedding watermarking, but also improves the robustness against the random tampering of self-embedding watermarking. In addition, the subjective measurements are provided to evaluate the performance of the self-recovery watermarking schemes for image authentication.
暂无评论