A novel Discrete Wavelet Transform (DWT) based Hidden Markov Module (HMM) for face recognition is presented in this letter. To improve the accuracy of HMM based face recognition algorithm, DWT is used to replace Discr...A novel Discrete Wavelet Transform (DWT) based Hidden Markov Module (HMM) for face recognition is presented in this letter. To improve the accuracy of HMM based face recognition algorithm, DWT is used to replace Discrete Cosine Transform (DCT) for observation sequence ex- traction. Extensive experiments are conducted on two public databases and the results show that the proposed method can improve the accuracy significantly, especially when the face database is large and only few training images are available.展开更多
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con...This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place.展开更多
A distributed and adaptive framework (DAF) was proposed for provisioning quality of service (QoS) in IPv6 network. In DAF, per-flow admission control and resource reservation, in conjunction with a new IPv6 flow label...A distributed and adaptive framework (DAF) was proposed for provisioning quality of service (QoS) in IPv6 network. In DAF, per-flow admission control and resource reservation, in conjunction with a new IPv6 flow label mechanism, can be performed instantaneously in a fully distributed and independent fashion at the edge of network without hop-by-hop signaling. The flow label helps in resource reservation and packets forwarding for aggregated traffic on an edge-to-edge path basis. In addition, a bounded directional probing technique for DAF was designed to reconfigure resource reservation adaptively between every pair of edge router for aggregated traffic according to the fluctuation of its traffic load. The simulation results show that DAF provides QoS guarantees to individual flows with minimal overhead, as well as keeping the scalability characteristic like DiffServ.展开更多
As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless app...As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless applications. A new self-healing key distribution scheme was proposed, which is optimal in terms of user memory storage and efficient in terms of communication complexity.展开更多
A method and results of identification of wear debris using their morphological features are presented. The color images of wear debris were used as initial data. Each particle was characterized by a set of numerical ...A method and results of identification of wear debris using their morphological features are presented. The color images of wear debris were used as initial data. Each particle was characterized by a set of numerical parameters combined by its shape, color and surface texture features through a computer vision system. Those features were used as input vector of artificial neural network for wear debris identification. A radius basis function (RBF) network based model suitable for wear debris recognition was established, and its algorithm was presented in detail. Compared with traditional recognition methods, the RBF network model is faster in convergence, and higher in accuracy.展开更多
With the rapid development of computer technology and network technology, the service model of university library gradually goes to the intelligent, personalized directionfrom the traditional single reference, but the...With the rapid development of computer technology and network technology, the service model of university library gradually goes to the intelligent, personalized directionfrom the traditional single reference, but there are many shortcomings. It cannot fully satisfy the increasing needs for the division Health research and information, it must actively build the University Library subject Knowledge service Model of a science. This paper introduces the subject of service concepts of library knowledge, proposes effective method to build service model of university library knowledge, and strengthens academic knowledge service countermeasures to promote the development of knowledge- disciplinary university library services.展开更多
基金Supported by SZU R/D Fund 200746, the National Natural Science Foundation of China (No. 60572100)Royal Society (U.K.) International Joint Projects 2006/R3-Cost Share with NSFC, Foundation of State Key Laboratory of Networking and Switching Technol-ogy (Beijing University of Posts and Telecommunications, China) and Guangdong Natural Science Foundation (No.06105776).
文摘A novel Discrete Wavelet Transform (DWT) based Hidden Markov Module (HMM) for face recognition is presented in this letter. To improve the accuracy of HMM based face recognition algorithm, DWT is used to replace Discrete Cosine Transform (DCT) for observation sequence ex- traction. Extensive experiments are conducted on two public databases and the results show that the proposed method can improve the accuracy significantly, especially when the face database is large and only few training images are available.
基金Supported by Hi-Tech R&D 863 Program of China (No. 20021111901010) and Scientific Research Fund of Hunan Provincial Education Department (No. 03A033)
文摘This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place.
文摘A distributed and adaptive framework (DAF) was proposed for provisioning quality of service (QoS) in IPv6 network. In DAF, per-flow admission control and resource reservation, in conjunction with a new IPv6 flow label mechanism, can be performed instantaneously in a fully distributed and independent fashion at the edge of network without hop-by-hop signaling. The flow label helps in resource reservation and packets forwarding for aggregated traffic on an edge-to-edge path basis. In addition, a bounded directional probing technique for DAF was designed to reconfigure resource reservation adaptively between every pair of edge router for aggregated traffic according to the fluctuation of its traffic load. The simulation results show that DAF provides QoS guarantees to individual flows with minimal overhead, as well as keeping the scalability characteristic like DiffServ.
基金The Specialized Research Fund for the Doctoral Program of Higher Education of China (No. 20050248043)
文摘As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless applications. A new self-healing key distribution scheme was proposed, which is optimal in terms of user memory storage and efficient in terms of communication complexity.
文摘A method and results of identification of wear debris using their morphological features are presented. The color images of wear debris were used as initial data. Each particle was characterized by a set of numerical parameters combined by its shape, color and surface texture features through a computer vision system. Those features were used as input vector of artificial neural network for wear debris identification. A radius basis function (RBF) network based model suitable for wear debris recognition was established, and its algorithm was presented in detail. Compared with traditional recognition methods, the RBF network model is faster in convergence, and higher in accuracy.
文摘With the rapid development of computer technology and network technology, the service model of university library gradually goes to the intelligent, personalized directionfrom the traditional single reference, but there are many shortcomings. It cannot fully satisfy the increasing needs for the division Health research and information, it must actively build the University Library subject Knowledge service Model of a science. This paper introduces the subject of service concepts of library knowledge, proposes effective method to build service model of university library knowledge, and strengthens academic knowledge service countermeasures to promote the development of knowledge- disciplinary university library services.