首页 > 最新文献

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)最新文献

英文 中文
A Camera Calibration Strategy in the Video-based Traffic Information Detection 基于视频的交通信息检测中的摄像机标定策略
Yu Yuan, Jiang Dan
In this paper an improved camera calibration algorithm is applied to the video-based traffic information detection. The geometric camera model is set up based on the pin-hole model and Direct Linear Transformation (DLT). Adopting the coplanar condition, we estimate parameters of the model and realize the transform from image coordinates to world coordinates in the end. The problem of control points is discussed. In our experiment, the algorithm has the advantage of high-accuracy and its parameters can be easily estimated. It is proved that the algorithm could meet the requirement of calibration accuracy in the application of the video-based traffic information detection.
本文将改进的摄像机标定算法应用于基于视频的交通信息检测中。基于针孔模型和直接线性变换(DLT)建立了几何相机模型。采用共面条件对模型参数进行估计,最终实现了图像坐标到世界坐标的转换。讨论了控制点问题。在我们的实验中,该算法具有精度高、参数易于估计的优点。实践证明,该算法能够满足基于视频的交通信息检测对标定精度的要求。
{"title":"A Camera Calibration Strategy in the Video-based Traffic Information Detection","authors":"Yu Yuan, Jiang Dan","doi":"10.1109/SNPD.2007.16","DOIUrl":"https://doi.org/10.1109/SNPD.2007.16","url":null,"abstract":"In this paper an improved camera calibration algorithm is applied to the video-based traffic information detection. The geometric camera model is set up based on the pin-hole model and Direct Linear Transformation (DLT). Adopting the coplanar condition, we estimate parameters of the model and realize the transform from image coordinates to world coordinates in the end. The problem of control points is discussed. In our experiment, the algorithm has the advantage of high-accuracy and its parameters can be easily estimated. It is proved that the algorithm could meet the requirement of calibration accuracy in the application of the video-based traffic information detection.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120827270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web Services Based Email Extension for Remote Monitoring of Embedded Systems 基于Web服务的嵌入式系统远程监控电子邮件扩展
Cao Chengzhi, Gu Xiaofeng, Liu Yang
Nowadays, remote control applications via the Internet are going to be used more and more widely with the development of powerful chips and network technology. For applications which do not need real time communication or persistent connection and have a little amount of data transportation, conventional approaches based on Web services either are a little bit complex, or have a higher overhead. In this paper we introduce another method called WeeRMES, a Web services based email extension for remote monitoring of embedded systems, to be supplement of conventional remote control methods in some special occasions. Thanks to the model, we are able to do all those things using emails such as sending devices instructions, inspecting device status and gathering data using XML capsulated messages. User interfaces can be dynamically achieved by means of XForms generated by Java classes loaded on target devices. Furthermore, researches are carried out on security mechanism to ensure safety and robustness of the system. An idiographic implementation is given as an example in the end.
随着强大的芯片技术和网络技术的发展,基于Internet的远程控制应用将得到越来越广泛的应用。对于不需要实时通信或持久连接并且只有少量数据传输的应用程序,基于Web服务的传统方法要么有点复杂,要么开销更高。本文介绍了另一种方法WeeRMES,它是一种基于Web服务的嵌入式系统远程监控的电子邮件扩展,可以在一些特殊场合作为传统远程控制方法的补充。由于该模型,我们能够使用电子邮件完成所有这些事情,例如发送设备指令、检查设备状态和使用XML封装消息收集数据。用户界面可以通过加载在目标设备上的Java类生成的XForms来动态实现。此外,还对安全机制进行了研究,以保证系统的安全性和鲁棒性。最后给出了具体实现实例。
{"title":"A Web Services Based Email Extension for Remote Monitoring of Embedded Systems","authors":"Cao Chengzhi, Gu Xiaofeng, Liu Yang","doi":"10.1109/SNPD.2007.453","DOIUrl":"https://doi.org/10.1109/SNPD.2007.453","url":null,"abstract":"Nowadays, remote control applications via the Internet are going to be used more and more widely with the development of powerful chips and network technology. For applications which do not need real time communication or persistent connection and have a little amount of data transportation, conventional approaches based on Web services either are a little bit complex, or have a higher overhead. In this paper we introduce another method called WeeRMES, a Web services based email extension for remote monitoring of embedded systems, to be supplement of conventional remote control methods in some special occasions. Thanks to the model, we are able to do all those things using emails such as sending devices instructions, inspecting device status and gathering data using XML capsulated messages. User interfaces can be dynamically achieved by means of XForms generated by Java classes loaded on target devices. Furthermore, researches are carried out on security mechanism to ensure safety and robustness of the system. An idiographic implementation is given as an example in the end.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116263177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Quick Algorithm for Computing Core Based on the Positive Region 一种基于正域计算核的快速算法
Wei-Dong Cai, Zhangyan Xu, Wei Song, Bingru Yang
Some scholars provided the discernibility matrix based on the positive region. The time complexity of the algorithm for computing core with this discernibility matrix is O(|CparU|2 ). For cutting down the time complexity of the algorithm, the definition of simplified discernibility matrix based on the positive region and the corresponding definition of the core are provided. At the same time, it is proved that this core is equivalent to the core based on the positive region. Since the partition of U/C is the key process for computing simplified discernibility matrix, a quick algorithm for computing U/C is designed with the idea of radix sorting. Its time complexity is O(|CparU|). On this condition, a new algorithm for computing core based on the positive region is designed with the simplified discernibility. Its time complexity is cut down to max{O(|CparU'posparU/C|), O(|CparU|)}.
有学者提出了基于正域的差别矩阵。该算法计算该差别矩阵核心的时间复杂度为0 (|CparU|2)。为了降低算法的时间复杂度,给出了基于正域的简化差别矩阵的定义和相应的核心定义。同时,证明了该核与基于正区域的核是等价的。由于U/C的划分是计算简化差别矩阵的关键环节,采用基数排序的思想设计了一种快速计算U/C的算法。其时间复杂度为0 (|CparU|)。在此基础上,设计了一种新的基于正域的计算核算法,简化了可辨性。它的时间复杂度降低到max{O(|CparU'posparU/C|), O(|CparU|)}。
{"title":"A Quick Algorithm for Computing Core Based on the Positive Region","authors":"Wei-Dong Cai, Zhangyan Xu, Wei Song, Bingru Yang","doi":"10.1109/SNPD.2007.87","DOIUrl":"https://doi.org/10.1109/SNPD.2007.87","url":null,"abstract":"Some scholars provided the discernibility matrix based on the positive region. The time complexity of the algorithm for computing core with this discernibility matrix is O(|CparU|2 ). For cutting down the time complexity of the algorithm, the definition of simplified discernibility matrix based on the positive region and the corresponding definition of the core are provided. At the same time, it is proved that this core is equivalent to the core based on the positive region. Since the partition of U/C is the key process for computing simplified discernibility matrix, a quick algorithm for computing U/C is designed with the idea of radix sorting. Its time complexity is O(|CparU|). On this condition, a new algorithm for computing core based on the positive region is designed with the simplified discernibility. Its time complexity is cut down to max{O(|CparU'posparU/C|), O(|CparU|)}.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The differences of COTS-based project stakeholders 基于cots的项目干系人的差异
Yunmei Du, Shixian Li
Stakeholder cooperation is important for conducting a successful software project. The software industry has increasingly expanded its adoption of COTS components for complex applications. The stakeholders of COTS-based projects differ considerably from these of conventional custom development projects. All members of the project team should print the COTS-inclusion concept deeply within their mind. There are also great changes in roles and needed skills. For COTS-based project, it is crucial to understand all classes of stakeholders, their responsibilities, and inter-collaboration relationships by contrasting with traditional software development. According to the characteristics of COTS-based project, focusing on the differences, this paper is regulated to elaborate on all stakeholder roles and corresponding responsibilities, the differences with custom-development project, and the cooperation relationship between stakeholders.
涉众的合作对于成功的软件项目是非常重要的。软件行业越来越多地扩展了对复杂应用程序的COTS组件的采用。基于cots的项目的涉众与传统的定制开发项目的涉众有很大的不同。项目团队的所有成员都应该将COTS-inclusion的概念深深地印在他们的脑海中。角色和所需技能也有很大的变化。对于基于cots的项目,通过与传统软件开发的对比,理解涉众的所有类别、他们的职责和内部协作关系是至关重要的。本文根据基于cots的项目的特点,针对不同之处,详细阐述了各利益相关者的角色和相应的责任,与定制开发项目的不同之处,以及利益相关者之间的合作关系。
{"title":"The differences of COTS-based project stakeholders","authors":"Yunmei Du, Shixian Li","doi":"10.1109/SNPD.2007.494","DOIUrl":"https://doi.org/10.1109/SNPD.2007.494","url":null,"abstract":"Stakeholder cooperation is important for conducting a successful software project. The software industry has increasingly expanded its adoption of COTS components for complex applications. The stakeholders of COTS-based projects differ considerably from these of conventional custom development projects. All members of the project team should print the COTS-inclusion concept deeply within their mind. There are also great changes in roles and needed skills. For COTS-based project, it is crucial to understand all classes of stakeholders, their responsibilities, and inter-collaboration relationships by contrasting with traditional software development. According to the characteristics of COTS-based project, focusing on the differences, this paper is regulated to elaborate on all stakeholder roles and corresponding responsibilities, the differences with custom-development project, and the cooperation relationship between stakeholders.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Organization Technology in Mobile Peer-to-peer Network Based on Mobile Unit 基于移动单元的移动对等网络组织技术
Liang Ye, Ci Lin-lin
Mobile end devices become more and more powerful, enabling them to execute more sophisticated tasks. Hence it is desirable to leverage these potential resources, by being able to execute tasks on external devices. At the same time, peer-to-peer (P2P) gains more and more attention, and will level the difference between clients and servers. As P2P technology proved to be an effective means for mobile computing, it seems logical to combine the benefits of both worlds. This paper discusses how to organize a Mobile P2P (MP2P) infrastructure, and the experimental results show that the services running on MP2P network have better efficiency than on traditional client/server model network.
移动终端设备变得越来越强大,使它们能够执行更复杂的任务。因此,通过能够在外部设备上执行任务来利用这些潜在的资源是可取的。与此同时,P2P (peer-to-peer,点对点)技术越来越受到人们的关注,它将消除客户端和服务器之间的差异。随着P2P技术被证明是移动计算的一种有效手段,将两者的优势结合起来似乎是合乎逻辑的。本文讨论了如何组织一个移动P2P (MP2P)基础架构,实验结果表明,在MP2P网络上运行的业务比在传统的客户端/服务器模型网络上运行的业务具有更高的效率。
{"title":"Organization Technology in Mobile Peer-to-peer Network Based on Mobile Unit","authors":"Liang Ye, Ci Lin-lin","doi":"10.1109/SNPD.2007.410","DOIUrl":"https://doi.org/10.1109/SNPD.2007.410","url":null,"abstract":"Mobile end devices become more and more powerful, enabling them to execute more sophisticated tasks. Hence it is desirable to leverage these potential resources, by being able to execute tasks on external devices. At the same time, peer-to-peer (P2P) gains more and more attention, and will level the difference between clients and servers. As P2P technology proved to be an effective means for mobile computing, it seems logical to combine the benefits of both worlds. This paper discusses how to organize a Mobile P2P (MP2P) infrastructure, and the experimental results show that the services running on MP2P network have better efficiency than on traditional client/server model network.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Oscillation Criteria of Second-Order Delay Dynamic Equations on Time Scales 时间尺度上二阶时滞动力学方程的振动准则
Z. Han, Shurong Sun
By means of Riccati transformation technique, we establish some new oscillation criteria for the second-order delay dynamic equations. Our results in this paper not only extend the results given in Sahiner [?] but also unify the oscillation of the second order nonlinear delay differential equation and the second order nonlinear delay difference equation.
利用Riccati变换技术,建立了二阶时滞动力学方程的振动准则。本文的结果不仅推广了Sahiner [?]也统一了二阶非线性时滞微分方程和二阶非线性时滞差分方程的振动性。
{"title":"Oscillation Criteria of Second-Order Delay Dynamic Equations on Time Scales","authors":"Z. Han, Shurong Sun","doi":"10.1109/SNPD.2007.62","DOIUrl":"https://doi.org/10.1109/SNPD.2007.62","url":null,"abstract":"By means of Riccati transformation technique, we establish some new oscillation criteria for the second-order delay dynamic equations. Our results in this paper not only extend the results given in Sahiner [?] but also unify the oscillation of the second order nonlinear delay differential equation and the second order nonlinear delay difference equation.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Battle Damage Assessment based on Bayesian Network 基于贝叶斯网络的战损评估
Zhijun Ma, Quan Shi, Bin Li
With increasing tempo of war and complication of battle field, battle damage assessment (BDA) has become more critical to the decision of commander. In the Persian Gulf War, the BDA system of U.S. army couldn't meet the needs of commanders in both accuracy and speed, and badly blocked operations, one of its main reasons was lack of scientific and reasonable assessment model for BDA. According to the fact of BDA and the characters of Bayesian network, paper studies the theory of BDA based on Bayesian network, expatiates upon the modeling of Bayesian decision model for BDA, and puts forward a way to update the model, to enhance the accuracy of assessment.
随着战争节奏的加快和战场的复杂化,战损评估(BDA)对指挥官的决策越来越重要。在波斯湾战争中,美军的BDA系统在精度和速度上都不能满足指挥员的需要,作战受阻严重,其主要原因之一是缺乏科学合理的BDA评估模型。根据BDA的实际情况和贝叶斯网络的特点,研究了基于贝叶斯网络的BDA理论,阐述了BDA贝叶斯决策模型的建模方法,并提出了一种更新模型的方法,以提高评估的准确性。
{"title":"Battle Damage Assessment based on Bayesian Network","authors":"Zhijun Ma, Quan Shi, Bin Li","doi":"10.1109/SNPD.2007.421","DOIUrl":"https://doi.org/10.1109/SNPD.2007.421","url":null,"abstract":"With increasing tempo of war and complication of battle field, battle damage assessment (BDA) has become more critical to the decision of commander. In the Persian Gulf War, the BDA system of U.S. army couldn't meet the needs of commanders in both accuracy and speed, and badly blocked operations, one of its main reasons was lack of scientific and reasonable assessment model for BDA. According to the fact of BDA and the characters of Bayesian network, paper studies the theory of BDA based on Bayesian network, expatiates upon the modeling of Bayesian decision model for BDA, and puts forward a way to update the model, to enhance the accuracy of assessment.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Scalable Search Algorithm on Unstructured P2P Networks 非结构化P2P网络的可扩展搜索算法
Fuyong Yuan, Jian Liu, Chunxia Yin
Gnutella is one of the prominent unstructured P2P networks. In the unstructured P2P networks, the network topology and the placement of files are largely unconstrained. The primitive search algorithm in Gnutella is flooding-based. The algorithm produces too much traffic though with limited search region which is constrained by TTL value. To improve search efficiency and reduce unnecessary traffic in Gnutella, this paper proposes an algorithm to unstructured P2P network, and it consists of ranked neighbor caching scheme and queryhit caching scheme. The proposed algorithm can extend the search region but reduce the search traffic, and also balance the network load, so that acquires the whole networks scalable.
Gnutella是一个突出的非结构化P2P网络。在非结构化的P2P网络中,网络拓扑和文件的位置在很大程度上是不受约束的。Gnutella的原始搜索算法是基于泛洪的。该算法受TTL值约束,搜索区域有限,但产生的流量过大。为了提高Gnutella的搜索效率和减少不必要的流量,本文提出了一种针对非结构化P2P网络的算法,该算法由排序邻居缓存方案和查询命中缓存方案组成。该算法在扩展搜索区域的同时减少了搜索流量,并平衡了网络负载,使整个网络具有可扩展性。
{"title":"A Scalable Search Algorithm on Unstructured P2P Networks","authors":"Fuyong Yuan, Jian Liu, Chunxia Yin","doi":"10.1109/SNPD.2007.391","DOIUrl":"https://doi.org/10.1109/SNPD.2007.391","url":null,"abstract":"Gnutella is one of the prominent unstructured P2P networks. In the unstructured P2P networks, the network topology and the placement of files are largely unconstrained. The primitive search algorithm in Gnutella is flooding-based. The algorithm produces too much traffic though with limited search region which is constrained by TTL value. To improve search efficiency and reduce unnecessary traffic in Gnutella, this paper proposes an algorithm to unstructured P2P network, and it consists of ranked neighbor caching scheme and queryhit caching scheme. The proposed algorithm can extend the search region but reduce the search traffic, and also balance the network load, so that acquires the whole networks scalable.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"43 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Approach to Detect the Presence of LSB Steganographic Messages 一种检测LSB隐写信息存在的新方法
Zongyuan Deng, Xi Shao, Zhen Yang
Digital steganography introduces statistical distortion to some extent. Thus, steganalysis can be used to classify an object with or without hidden information. In this paper, we present a novel approach to detect the presence of LSB (least significant bit) steganographic messages in the voice secure communication system. A distance measure, which has been proved to be sensitive to LSB steganography by ANOVA (analysis of variance), is denoted to estimate the difference between the host signal and the stego signal. Then a MI (maximum likelihood) decision is combined to form the classifier. Statistical experiments show that the proposed approach has highly accurate rate and low computational complexity.
数字隐写术在一定程度上引入了统计失真。因此,隐写分析可以用来对有或没有隐藏信息的对象进行分类。本文提出了一种检测语音安全通信系统中存在的LSB(最低有效位)隐写信息的新方法。用方差分析(ANOVA)证明了对LSB隐写很敏感的距离度量来估计宿主信号和隐写信号之间的差异。然后结合最大似然决策形成分类器。统计实验表明,该方法具有较高的准确率和较低的计算复杂度。
{"title":"A Novel Approach to Detect the Presence of LSB Steganographic Messages","authors":"Zongyuan Deng, Xi Shao, Zhen Yang","doi":"10.1109/SNPD.2007.303","DOIUrl":"https://doi.org/10.1109/SNPD.2007.303","url":null,"abstract":"Digital steganography introduces statistical distortion to some extent. Thus, steganalysis can be used to classify an object with or without hidden information. In this paper, we present a novel approach to detect the presence of LSB (least significant bit) steganographic messages in the voice secure communication system. A distance measure, which has been proved to be sensitive to LSB steganography by ANOVA (analysis of variance), is denoted to estimate the difference between the host signal and the stego signal. Then a MI (maximum likelihood) decision is combined to form the classifier. Statistical experiments show that the proposed approach has highly accurate rate and low computational complexity.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural Network 基于Hopfield神经网络的钢管焊接气孔检测新算法
Weixin Gao, Tang Nan, Xiangyang Mu
The paper segment x-ray images of steel pipe welding to assess the quality of welding. Image segmentation is posed as an optimization problem, and is correlated with the energy function of the multistage Hopfield neural network. The algorithm for optimization and the principle of selecting coefficient are also given. The algorithm is easy to be programmed. As an application, we successfully segment some real industrial welding x-ray images.
采用纸段x射线图像对钢管焊接质量进行评定。将图像分割作为一个优化问题,与多级Hopfield神经网络的能量函数相关联。给出了优化算法和选择系数的原则。该算法易于编程。作为应用,我们成功地分割了一些真实的工业焊接x射线图像。
{"title":"A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural Network","authors":"Weixin Gao, Tang Nan, Xiangyang Mu","doi":"10.1109/SNPD.2007.66","DOIUrl":"https://doi.org/10.1109/SNPD.2007.66","url":null,"abstract":"The paper segment x-ray images of steel pipe welding to assess the quality of welding. Image segmentation is posed as an optimization problem, and is correlated with the energy function of the multistage Hopfield neural network. The algorithm for optimization and the principle of selecting coefficient are also given. The algorithm is easy to be programmed. As an application, we successfully segment some real industrial welding x-ray images.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"s3-29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1