期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
地下水环境脆弱程度图编图方法研究 被引量:9
1
作者 林山杉 武健强 张勃夫 《水文地质工程地质》 CAS CSCD 2000年第3期6-8,24,共4页
由于地下水的过量开采 ,导致地下水资源乃至地下水环境遭到不同程度的破坏 ,引起许多与其相关的生态环境问题。为此 ,本文引用地下水环境脆弱性概念 ,并以松嫩平原为例 ,采用先进的理论和方法 ,以包气带厚度、包气带渗透系数、地下水补... 由于地下水的过量开采 ,导致地下水资源乃至地下水环境遭到不同程度的破坏 ,引起许多与其相关的生态环境问题。为此 ,本文引用地下水环境脆弱性概念 ,并以松嫩平原为例 ,采用先进的理论和方法 ,以包气带厚度、包气带渗透系数、地下水补给强度及地下水水力坡度等为定量化指标划分不同脆弱程度地区 ,编制了为统一协调资源与环境 ,优化开采提供依据的一种新的地下水环境脆弱程度图。 展开更多
关键词 地下水 环境脆弱程度 图编图法 地下水补给强度
下载PDF
Grayscale image encryption algorithm based on chaotic maps 被引量:1
2
作者 李昌刚 韩正之 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2003年第3期329-331,共3页
A new image encryption/decryption algorithm has been designed using discrete chaotic systems as aSP (Substitution and Permutation) network architecture often used in cryptosystems. It is composed of two mainmodules: s... A new image encryption/decryption algorithm has been designed using discrete chaotic systems as aSP (Substitution and Permutation) network architecture often used in cryptosystems. It is composed of two mainmodules: substitution module and permutation module. Both analyses and numerical results imply that the algo-rithm has the desirable security and efficiency. 展开更多
关键词 discrete chaotic system image encryption SP network architecture
下载PDF
An Anti-aliasing Algorithm Suitable to Map Publishing Symbol
3
作者 DENG Shujun 《Geo-Spatial Information Science》 2006年第3期210-215,共6页
On the basis of analysis of various algorithms, an anti-aliasing algorithm called brush method was presented, which is suitable to map publishing symbol. After introducing the basic principle and implementation of bru... On the basis of analysis of various algorithms, an anti-aliasing algorithm called brush method was presented, which is suitable to map publishing symbol. After introducing the basic principle and implementation of brush method in detail, the result and efficiency were evaluated through experiments. 展开更多
关键词 ALIASING ANTI-ALIASING map publishing symbol brush method RESOLUTION
下载PDF
Generating and AnalyzingN-di mensional Hilbert Cell
4
作者 FENG Yucai LI Chenyang 《Geo-Spatial Information Science》 2005年第4期297-305,共9页
In this paper, two algorithms are presented for generating two code scan lists of an N dimensional Hilbert cell, and a formal proof of the backward encoding algorithm is given. On the basis of the self similarity prop... In this paper, two algorithms are presented for generating two code scan lists of an N dimensional Hilbert cell, and a formal proof of the backward encoding algorithm is given. On the basis of the self similarity properties of a Hilbert curve, this paper gives a novel algorithm for generating a static evolvement rule table through analyzing a Hilbert cell. By looking up the static evolvement rule table, the N dimensional Hilbert mappings are efficiently implemented. 展开更多
关键词 ALGORITHM Hilbert curve space-filling curve
下载PDF
A high fidelity VQ coding algorithm with region adaptive subbanding
5
作者 杨仲琦 白直灿 +1 位作者 李冬梅 杨长生 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期43-48,共6页
Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantizati... Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantization (VQ) coding algorithm to image subband. In the algorithm, vector quantizers were adaptively designed for high-frequency bands in an image. In particular, the edges of the image were examined and fewer bits were assigned to high-energy regions. The experimental result showed that the algorithm had higher SNR and higher compression ratio than possible by traditional subband coding, JPEG and JPEG 2000. 展开更多
关键词 Image compression SUBBAND Vector quantization (VQ)
下载PDF
Information hiding scheme for vector maps based on fingerprint certification
6
作者 门朝光 孙建国 曹刘娟 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期766-770,共5页
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in... An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%. 展开更多
关键词 information hiding digital watermarking vector map FINGERPRINT AUTHENTICATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部