Showing 5,481 - 5,500 results of 67,915 for search 'DASB~', query time: 2.65s Refine Results
  1. 5481

    Novel watermarking based on DIBR 3D image by Chen CUI, Shen WANG, Qiong LI

    Published 2016-05-01
    “…Depth-image-based rendering (DIBR) has become an important technology in 3D displaying with its great advantages.As a result,more and more 3D products copyright problems turn out.Since either the center view with depth image or the synthesized virtual views could be illegally distributed,not only the center views but also the synthesized virtual views need to be protected.A watermarking method for DIBR 3D images was proposed.After applying three-level DWT to the center image,odd-even quantization was utilized to modify the coefficients of the sub-blocks of the center image,by this way the proposed method was made robust to typical signal distortions,such as JPEG compression,noise addition and median filter.As the experimental results shown,the proposed method is much more robust to the common signal distortion attacks with lower BER (bit error rate) compared with existing methods.…”
    Get full text
    Article
  2. 5482

    Malaria Disease Prediction Based on Convolutional Neural Networks by Dhrgam AL Kafaf, Noor N. Thamir, Samara S. AL-Hadithy

    Published 2024-06-01
    “…By harnessing their unique architecture and regularization techniques, CNNs have the capability to enhance the results and potentially bring about better outcomes in areas with prevalent cases of malaria. …”
    Get full text
    Article
  3. 5483

    Malicious DNS traffic detection based neural networks by SHAN Kangkang, YUAN Shuhong, CHEN Wenzhi, WANG Zhibo

    Published 2024-11-01
    “…Then, convolutional neural network was used to classify the processed frequency domain sequence data. The experimental results show that compared with several mainstream detection methods, FDS-DL has a higher accuracy in identifying malicious DNS traffic and F1_score is optimal.…”
    Get full text
    Article
  4. 5484

    Research on multiflow in wireless networks based on network coding by Jin-yi ZHOU, Shu-tao XIA, Yong JIANG, Hai-tao ZHENG

    Published 2013-08-01
    “…In a multihop wireless network,wireless interference is crucial to the multi-commodity flow problem,which studies the maximum throughput between multiple pairs of sources and sinks.Based on the observation that network coding (NC) could help to decrease the impacts of wireless interference,a framework was proposed to solve the problem for multihop wireless networks with NC.By introducing hyperarcs to model all possible (uncoded or encoded) transmissions and using the conflict graph of hyperarcs to describe the new conflict relations modified by NC (e.g.…”
    Get full text
    Article
  5. 5485

    Detecting DNS-based covert channel on live traffic by Si-yu ZHANG, Fu-tai1 ZOU, Lu-hua WANG, Ming CHEN

    Published 2013-05-01
    “…To propose an effective detection method for DNS-based covert channel,traffic characteristics were thor-oughly studied.12 features were extracted from DNS packets to distinguish covert channels from legitimate DNS queries.Statistical characteristics of these features are used as input of the machine learning classifier.Experimental results show that the decision tree model detects all 22 covert channels used in training,and is capable of detecting untrained covert channels.Several DNS tunnels were detected during the evaluation on campus network's live DNS traffic.…”
    Get full text
    Article
  6. 5486

    Research on Flood Forecasting Based on Double-excess Model by HU Xinwei, ZHANG Yu, ZHU Xueping, ZHAO Xuehua

    Published 2021-01-01
    “…In order to conduct the flood forecasting research of small watershed in the control basin of Lengkou hydrological station,this paper firstly process the digital elevation model (DEM) of the study area;calculates the area weight of the sub-basin by Thiessen polygon method,the runoff yield by the double-excess flow model,the overland flow through the Nash instantaneous unit line method and the flood in river course by SWAI<sub>1</sub>,and establishes the double-excess flood forecasting model;analyzes the sensitivity of model parameters with LH-OAT method;and calibrates and verifies the model parameters for 25 historical floods with different flood levels.The simulation results reach grade B forecast precision in the period of calibration and verification,so the simulation effect is good.The research results can provide reliable reference for hydrological forecast,flood control and disaster reduction,and enrich the research experience of flood forecasting in semi-arid and semi-humid areas.…”
    Get full text
    Article
  7. 5487

    Knowledge as the basis for forming the innovative potential of the organization staff by I. N. Ivanov, L. V. Orlova

    Published 2023-03-01
    “…The article is devoted to the development of innovative potential of the personnel based on knowledge management. The controversy surrounding the concept of innovative potential is highlighted. …”
    Get full text
    Article
  8. 5488

    Anonymous whistleblowers reply scheme based on secret sharing by HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing

    Published 2024-12-01
    “…The security analysis showed that the proposed scheme enabled the anonymity of both data receivers and whistleblowers at the same time. …”
    Get full text
    Article
  9. 5489

    Symbolic execution optimization method based on input constraint by Sunlyu WANG, Yuqi LIN, Qiusong YANG, Mingshu LI

    Published 2019-03-01
    “…To solve path explosion,low rate of new path’s finding in the software testing,a new vulnerability discovering architecture based on input constraint symbolic execution (ICBSE) was proposed.ICBSE analyzed program source code to extract three types of constraints automatically.ICBSE then used these input constraints to guide symbolic execution to focus on core functions.Through implemented this architecture in KLEE,and evaluated it on seven programs from five GNU software suites,such as coreutils,binutils,grep,patch and diff.ICBSE detected seven previously unknown bugs (KLEE found three of the seven).In addition,ICBSE increases instruction line coverage/branch coverage by about 20%,and decreases time for finding bugs by about 15%.…”
    Get full text
    Article
  10. 5490

    Precoding algorithm based on IQ imbalance in massive MIMO by Jun WANG, Jianxin DAI, Chonghu CHENG, Peng WANG, Sha LI

    Published 2016-04-01
    “…Massive multiple-input multiple-output(MIMO)refers to the idea equipping cellular base stations with a very large number of antennas,and is a communication way of severing several users. …”
    Get full text
    Article
  11. 5491

    Spatial epidemiology based on the analysis of COVID-19 in Africa by Joyce Akhalakwa Mukolwe, John Kamwele Mutinda, Amos Kipkorir Langat

    Published 2025-03-01
    “…The COVID-19 pandemic has posed significant challenges to global public health, with varying impacts across different regions. …”
    Get full text
    Article
  12. 5492
  13. 5493

    Automatic Recognition and Detection System Based on Machine Vision by Lu Wang, Lihong Cui

    Published 2022-01-01
    “…In order to realize the automation of part identification and detection and the intellectualization of part production, this paper proposes a method of automatic identification and detection of parts based on machine vision (overall method). This paper combines machine vision with motion control theory and uses pulse coupled neural network (PCNN) edge detection and recognition algorithms to preliminarily design a set of machine vision automatic recognition and detection systems and carry out detection and recognition experiments on small parts such as relay covers. …”
    Get full text
    Article
  14. 5494
  15. 5495

    Bearing Feature Extraction Method Based on the Time Subsequence by Wang Dexue, Nie Fei, Zheng Zhifei, Yu Yongsheng

    Published 2023-11-01
    “…Although pure time-domain features have the advantages of fast extraction speed and clear physical meaning, the diagnostic accuracy is slightly inferior to other methods. …”
    Get full text
    Article
  16. 5496
  17. 5497

    A Framework for an IP-Based DVB Transmission Network by Nimbe L. Ewald-Arostegui, Gorry Fairhurst, Ana Yun-Garcia

    Published 2010-01-01
    “…This challenge will need to be faced if broadcast transmission networks are to converge with IP infrastructure. The 2nd generation of DVB standards supports the Generic Stream, allowing the direct transmission of IP-based content using the Generic Stream Encapsulation (GSE), in addition to the native Transport Stream (TS). …”
    Get full text
    Article
  18. 5498

    Neural-field-based image reconstruction for bioluminescence tomography by Xuanxuan Zhang, Xu Cao, Jiulou Zhang, Lin Zhang, Guanglei Zhang

    Published 2025-01-01
    “…Deep learning (DL)-based image reconstruction methods have garnered increasing interest in the last few years. …”
    Get full text
    Article
  19. 5499

    Research of worm-propagation prediction based on stochastic experiment by LIU Ting1, ZHENG Qin-hua1, GUAN Xiao-hong1, QU Yu1, WANG Na1

    Published 2007-01-01
    “…The prediction of the worm propagation is the basis of the worm defense.It is becoming more difficult to model the propagation of worms in the early stage of worm-spreading,because the worm strategies are smarter and the Internet structure is more complicated than ever before.In present study,a stochastic simulator was designed to simulate the propagation of worms.From the analysis of 1000 groups of experiment results,it was proved that the worm-propagation is a stochastic process,and the correlation coefficient between each group of results is close to 1.Therefore,a new prediction method was proposed,which could accurately calculate the propagation of worm when 0.1% of all vulnerable hosts were infected.…”
    Get full text
    Article
  20. 5500

    Deployment scheme of RSU based on connection time in VANET by Zhengchao DING, Zhenchun WEI, Lin FENG

    Published 2017-04-01
    “…For the roadside unit (RSU) placement problem in vehicular Ad Hoc network (VANET),the deployment scheme of RSU based on connection time was proposed.The scheme find the optimal positions of RSU for maximizing the number of vehicles while ensuring a certain level of connection time under the limited number of RSU.The problem was modeled as a maximum coverage problem,and a binary particle swarm algorithm was designed to solve it.The simulation experiment was carried out with the real Beijing road network map and taxi GPS data.The simulation results show that the algorithm is convergent,stable and feasible.Compared with the greedy algorithm,the proposed scheme can provide continuous network service for more vehicles.…”
    Get full text
    Article