With the development of architecture design, virtual reality, entertainment, mechanical engineering and cultural heritage, digital watermarking has played an important role in copyright protection of 3-D objects. Howe...
详细信息
Over the last decade, partial differential equations (PDEs) have been justified as effective tools for image smoothing;they are able to achieve a good trade-off between noise removal and edge-preserving. Among various...
详细信息
The resource limitation of mobile devices causes the problem that the existing image processing software based on the centralized computing mode had difficulty running in mobile devices. A solution is given in the pap...
详细信息
Thinning algorithms can be classified into two general types: serial and parallel algorithms. Several algorithms have been proposed, but they have limitations. A new thinning algorithm based on the centroid of the blo...
详细信息
Border access control, network security mechanism and system access control are three separately access control procedures when user accessing the resource on network. Network access control mechanism, which adding th...
详细信息
A fuzzy clustering is one of important and valid methods to knowledge discovery. One of problems in fuzzy clustering is to determine a certain fuzzy sample classification in given limited sample space. Another is its ...
详细信息
Along with the rapid growth of the number of the availab.e web services over the internet, the quality of services (Qos) becomes an imperative concern for service consumers and providers. How to differentiate their qu...
详细信息
This paper presents a hybrid short-term traffic flow forecast technology. For the uncertainty, the short-term traffic flow forecast is complicated, and the accuracy is not high. This strategy combines the RBF neural n...
详细信息
This paper proposes the MDMA (Multi-dimensional Distributed Mining Association rules) algorithm based on advanced SQL query. The algorithm works on star-style structure networks. It uses CUBE operator in new standard ...
详细信息
In allusion to the boundary leaking problem of traditional active contours when used to extract facial features, two kinds of local information are introduced to enhance the weak boundary, then to build new external f...
详细信息
暂无评论