To improve the accuracy of plant leaf area, a new measurement method of plant leaf area based on Snake model was adopted in this study. In this paper, we captured leaf counter with improved Snake model, built up 8-dir...
详细信息
To solve the problem of the typical histogram equalization method used to enhance cardiac coronary artery angiography images, a novel method based on histogram equalization is proposed. Firstly, the Fuzzy C-Means clus...
详细信息
The paper proposes a method for automatically identifying plants by computer based on the analysis that the plants and culture media have different RGB color coordinates and HSI color coordinates scales. The method ca...
详细信息
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th...
详细信息
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is that,when the output of each step satisfies our condition,the message m can collide with m'= m + Δm,where Δm =(0,0,0,0,231,0,...,0).There is only one bit difference between m and m'.Two pairs of collision examples for HAVAL-128 are *** order to improve the probability of collision,we use four tricks of message *** attack's running time is less than 225.83 2-pass HAVAL computations,which is the best result for one-bit collision of HAVAL so far.
Wireless sensor networks have been widely used in many areas, and the network channel allocation depends on the Medium Access Control (MAC) protocol, so, it is critical to the performance of wireless sensor networks (...
详细信息
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info...
详细信息
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ...
详细信息
For mining sequential patterns on massive data set, the distributed sequential pattern mining algorithm based on MapReduce programming model and PrefixSpan is proposed. Mining tasks are decomposed to many small tasks,...
详细信息
An adaptive data hiding method is proposed that encapsulates forbidden zone data hiding in order to improve the robustness of watermark under the premise of ensuring the subjective quality of host video and the invisi...
详细信息
The Time Synchronized Mesh Protocol (TSMP) uses time synchronization, graph-routing and pre-scheduling of pair-wise communication while cycling through all available pre-divided channels to manage the whole network. W...
详细信息
The Time Synchronized Mesh Protocol (TSMP) uses time synchronization, graph-routing and pre-scheduling of pair-wise communication while cycling through all available pre-divided channels to manage the whole network. With the collision-free network we study the energy-hole problem and discuss how to fix or improve this problem with mathematical analyses. When knowing where the reason lies, we propose an algorithm which can enable the nodes to choose their transmission range and next hop relay in order to adjust energy consumption of nodes in different position of the network. With this ability nodes that have less energy can reduce their work, so do the nodes in the region nearer the sink, thus the lifetime of the network can be prolonged. At last we evaluate this algorithm by means of the NS2 stimulation tools, and the simulation result shows that we finally get a network with relatively longer lifetime.
暂无评论