作者:
Baowei WangLuyao ShenJunhao ZhangZenghui XuNeng WangSchool of Computer
Nanjing University of Information Science and TechnologyCollaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment TechnologyDigital Forensics Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044China School of Software
Nanjing University of Information Science and TechnologyNanjing210044China
Digital watermarking technology is adequate for copyright protection and content *** needs to be more research on the watermarking algorithm after printing and *** at the problem that existing anti-print scanning text...
详细信息
Digital watermarking technology is adequate for copyright protection and content *** needs to be more research on the watermarking algorithm after printing and *** at the problem that existing anti-print scanning text image watermarking algorithms cannot take into account the invisibility and robustness of the watermark,an anti-print scanning watermarking algorithm suitable for text images is *** algorithm first performs a series of image enhancement preprocessing operations on the printed scanned image to eliminate the interference of incorrect bit information on watermark embedding and then uses a combination of Discrete Wavelet Transform(DWT)-Singular Value Decomposition(SVD)to embed the *** show that the average Normalized Correlation(NC)of the watermark extracted by this algorithm against attacks such as Joint Photographic Experts Group(JPEG)compression,JPEG2000 compression,and print scanning is above ***,the average NC of the watermark extracted after print scanning attacks is greater than 0.964,and the average Bit Error Ratio(BER)is 5.15%.This indicates that this algorithm has strong resistance to various attacks and print scanning attacks and can better take into account the invisibility of the watermark.
Scene depth information plays a fundamental role and can be beneficial to various computer vision or visual robotics applications. The scene color image acquired by consumer depth sensors usually has a high resolution...
详细信息
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause signi...
详细信息
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause significant performance degradation for containerized applications and enhanced resource ***,current studies have almost not discussed the isolation problems of page cache which is a key resource for *** leverage memory cgroup to control page cache ***,existing policy introduces two major problems in a container-based ***,containers can utilize more memory than limited by their cgroup,effectively breaking memory ***,the Os kernel has to evict page cache to make space for newly-arrived memory requests,slowing down containerized *** paper performs an empirical study of these problems and demonstrates the performance impacts on containerized *** we propose pCache(precise control of page cache)to address the problems by dividing page cache into private and shared and controlling both kinds of page cache separately and *** do so,pCache leverages two new technologies:fair account(f-account)and evict on demand(EoD).F-account splits the shared page cache charging based on per-container share to prevent containers from using memory for free,enhancing memory *** EoD reduces unnecessary page cache evictions to avoid the performance *** evaluation results demonstrate that our system can effectively enhance memory isolation for containers and achieve substantial performance improvement over the original page cache management policy.
With the increasing traffic congestion problems in metropolises, traffic prediction plays an essential role in intelligent traffic systems. Notably, various deep learning models, especially graph neural networks (GNNs...
详细信息
To tackle two prevalent challenges in video anomaly detection, misclassification of abnormal frames as normal and the prolonged runtime of existing methods, this article proposes a time-efficient anomaly detection met...
详细信息
To enhance the corrosion resistance and electrical conductivity, the surface of 316L stainless steel was modified by the ion implantation of Mo. By investigating various accelerating voltages and implantation doses, i...
详细信息
To enhance the corrosion resistance and electrical conductivity, the surface of 316L stainless steel was modified by the ion implantation of Mo. By investigating various accelerating voltages and implantation doses, it was found that the corrosion resistance of stainless steel was enhanced by 50%-80% and the surface conductivity by 15%-28% at most. The minimum stabilized current density is 0.72 μA/cm^(2). This is due to the formation of a Cr and Mo riched modified layer on the surface of the stainless steel. Mo oxides synergize with Cr oxides in the form of a solid solution to enhance the corrosion resistance of passivation films on the stainless steel surface. The optimum parameters were Cr in the proportion of 6%-8% and Mo in the proportion of 4%-5%.
Semi-supervised medical image segmentation is currently a highly researched area. Pseudo-label learning is a traditional semi-supervised learning method aimed at acquiring additional knowledge by generating pseudo-lab...
详细信息
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically locate objects of interest in remote sensing images and distinguish their specific categories,is an important fundamental task in the *** provides an effective means for geospatial object monitoring in many social applications,such as intelligent transportation,urban planning,environmental monitoring and homeland security.
In this paper, we study the performance of wireless-powered cluster-based multi-hop cognitive relay networks (MCRNs), where secondary nodes harvest energy from multiple dedicated power beacons (PBs) and share the spec...
详细信息
In the electronic manufacturing industry, accurate detection of PCB defects is crucial as it directly impacts product quality and reliability. The primary challenges in PCB defect detection include missed detections a...
详细信息
暂无评论