This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con...This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place.展开更多
The conventional linear quadratic regulator(LQR) control algorithm is one of the most popular active control algorithms.One important issue for LQR control algorithm is the reduction of structure's degrees of free...The conventional linear quadratic regulator(LQR) control algorithm is one of the most popular active control algorithms.One important issue for LQR control algorithm is the reduction of structure's degrees of freedom(DOF). In this work, an LQR control algorithm with superelement model is intended to solve this issue leading to the fact that LQR control algorithm can be used in large finite element(FE) model for structure. In proposed model, the Craig-Bampton(C-B) method, which is one of the component mode syntheses(CMS), is used to establish superelement modeling to reduce structure's DOF and applied to LQR control algorithm to calculate Kalman gain matrix and obtain control forces. And then, the control forces are applied to original structure to simulate the responses of structure by vibration control. And some examples are given. The results show the computational efficiency of proposed model using synthesized models is higher than that of the classical method of LQR control when the DOF of structure is large. And the accuracy of proposed model is well. Meanwhile, the results show that the proposed control has more effects of vibration absorption on the ground structures than underground structures.展开更多
A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organ...A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.展开更多
In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(...In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(Y H)) required calibration. The value 0.42 was used for Yp /acetic in this study,while the default value of the BioWin software is 0.49,making it comparable with the default values of the corresponding parameter(yield of phosphorus release to substrate uptake(YPO4)) used in ASM2,ASM2 d,and ASM3 P,respectively. Three scenarios were evaluated to improve the performance of the wastewater treatment plant,the possibility of wasting sludge from either the aeration tank or the secondary clarifier,the construction of a new oxidation ditch,and the construction of an equalization tank. The results suggest that construction of a new oxidation ditch or an equalization tank for the wastewater treatment plant is not necessary. However,sludge should be wasted from the aeration tank during wet weather to reduce the solids loading of the clarifiers and avoid effluent violations. Therefore,it is recommended that the design of wastewater treatment plants(WWTPs) should include flexibility to operate the plants in various modes. This is helpful in selection of the appropriate operating mode when necessary,resulting in substantial reductions in operating costs.展开更多
Recently, some new characteristics of complex networks attract the attentions of scientist, in different fields, and lead to many kinds of emerging research directions. So far, most of the researcl work has been limit...Recently, some new characteristics of complex networks attract the attentions of scientist, in different fields, and lead to many kinds of emerging research directions. So far, most of the researcl work has been limited in discovery of complex network characteristics by structure analysis in large-scale software systems. This paper presents the theoretical basis, design method, algorithms and experiment results of the research. It firstly emphasizes the significance of design method of evolution growth for network topology of Object Oriented (OO) software systems, and argues that the selection and modulation of network models with various topology characteristics will bring un-ignorable effect on the process, of design and implementation of OO software systems. Then we analyze the similar discipline of "negation of negation and compromise" between the evolution of network models with different topology characteristics and the development of software modelling methods. According to the analysis of the growth features of software patterns, we propose an object-oriented software network evolution growth method and its algorithms in succession. In addition, we also propose the parameter systems for OO software system metrics based on complex network theory. Based on these parameter systems, it can analyze the features of various nodes, links and local-world, modulate the network topology and guide the software metrics. All these can be helpful to the detailed design, implementation and performance analysis. Finally, we focus on the application of the evolution algorithms and demonstrate it by a case study. Comparing the results from our early experiments with methodologies in empirical software engineering, we believe that the proposed software engineering design method is a computational software engineering approach based on complex network theory. We argue that this method should be greatly beneficial for the design, implementation, modulation and metrics of functionality, structure and performance in large-scale OO software complex system.展开更多
基金Supported by Hi-Tech R&D 863 Program of China (No. 20021111901010) and Scientific Research Fund of Hunan Provincial Education Department (No. 03A033)
文摘This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place.
基金Project(LZ2015022)supported by Educational Commission of Liaoning Province of ChinaProjects(51138001,51178081)supported by the National Natural Science Foundation of China+1 种基金Project(2013CB035905)supported by the Basic Research Program of ChinaProjects(DUT15LK34,DUT14QY10)supported by Fundamental Research Funds for the Central Universities,China
文摘The conventional linear quadratic regulator(LQR) control algorithm is one of the most popular active control algorithms.One important issue for LQR control algorithm is the reduction of structure's degrees of freedom(DOF). In this work, an LQR control algorithm with superelement model is intended to solve this issue leading to the fact that LQR control algorithm can be used in large finite element(FE) model for structure. In proposed model, the Craig-Bampton(C-B) method, which is one of the component mode syntheses(CMS), is used to establish superelement modeling to reduce structure's DOF and applied to LQR control algorithm to calculate Kalman gain matrix and obtain control forces. And then, the control forces are applied to original structure to simulate the responses of structure by vibration control. And some examples are given. The results show the computational efficiency of proposed model using synthesized models is higher than that of the classical method of LQR control when the DOF of structure is large. And the accuracy of proposed model is well. Meanwhile, the results show that the proposed control has more effects of vibration absorption on the ground structures than underground structures.
基金"China National Science Foundation"under grant No: 2001AA412010
文摘A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.
基金Supported by the College of Scientific Innovation Significant Cultivation Fund Financing Projects(No.708047)the Key Special Program for Pollution Control(No.2012ZX07101-003)
文摘In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(Y H)) required calibration. The value 0.42 was used for Yp /acetic in this study,while the default value of the BioWin software is 0.49,making it comparable with the default values of the corresponding parameter(yield of phosphorus release to substrate uptake(YPO4)) used in ASM2,ASM2 d,and ASM3 P,respectively. Three scenarios were evaluated to improve the performance of the wastewater treatment plant,the possibility of wasting sludge from either the aeration tank or the secondary clarifier,the construction of a new oxidation ditch,and the construction of an equalization tank. The results suggest that construction of a new oxidation ditch or an equalization tank for the wastewater treatment plant is not necessary. However,sludge should be wasted from the aeration tank during wet weather to reduce the solids loading of the clarifiers and avoid effluent violations. Therefore,it is recommended that the design of wastewater treatment plants(WWTPs) should include flexibility to operate the plants in various modes. This is helpful in selection of the appropriate operating mode when necessary,resulting in substantial reductions in operating costs.
基金Supported by the National Natural Science Foundation of China under Grant No.60373086IS0/IEC SC32 Standardization Project No.1.32.22.01.03.00+3 种基金"Tenth Five-Year Plan"National Key Project of Science and Technology under Grant No.2002BA906A21Hubei Province Key Project under Grant No.2004AA103A02Wuhan City Key Project under Grant No.200210020430pen Foundation of SKLSE under Grant No.SKLSE05-19.
文摘Recently, some new characteristics of complex networks attract the attentions of scientist, in different fields, and lead to many kinds of emerging research directions. So far, most of the researcl work has been limited in discovery of complex network characteristics by structure analysis in large-scale software systems. This paper presents the theoretical basis, design method, algorithms and experiment results of the research. It firstly emphasizes the significance of design method of evolution growth for network topology of Object Oriented (OO) software systems, and argues that the selection and modulation of network models with various topology characteristics will bring un-ignorable effect on the process, of design and implementation of OO software systems. Then we analyze the similar discipline of "negation of negation and compromise" between the evolution of network models with different topology characteristics and the development of software modelling methods. According to the analysis of the growth features of software patterns, we propose an object-oriented software network evolution growth method and its algorithms in succession. In addition, we also propose the parameter systems for OO software system metrics based on complex network theory. Based on these parameter systems, it can analyze the features of various nodes, links and local-world, modulate the network topology and guide the software metrics. All these can be helpful to the detailed design, implementation and performance analysis. Finally, we focus on the application of the evolution algorithms and demonstrate it by a case study. Comparing the results from our early experiments with methodologies in empirical software engineering, we believe that the proposed software engineering design method is a computational software engineering approach based on complex network theory. We argue that this method should be greatly beneficial for the design, implementation, modulation and metrics of functionality, structure and performance in large-scale OO software complex system.