摘要:
The paper proposed a fast method on discovering vehicle license plate position in image with very complicated background and bad shooting condition. Firstly, we deduced a new RGB threshold formula by limiting the hue change range. Secondly, we provided a fast method to detect license plate position according to the characteristics of colors of license plate. Finally, we performed a detection experiment with 416 images containing license plate and the result showed that almost all license plates could be discovered quickly with our method from the images with even quit complicated background.
关键词:
Data hiding capability;Frequency watermarking;Sigmoid function;Bright hiding capability
摘要:
This paper presents in detail an analysis of the ability of data hiding capabilities. According to the human visual features, this paper uses edge degree which can be computed by Log points, and combines distributed evenly degrees with sigmoid function which is adopted to describe bright hiding capability, and proposes an effective method to measure the data hiding capability. Moreover, this paper implements embedding and distilling watermark based on the frequency modulation. Using the idea of frequency modulation that belongs to communication engineering, and bringing up "frequency modulation watermark" which different to traditional watermark technique, we constitute base band signal by select the intermediate frequency coefficients of image piece which has strong data conceals ability, then, embedding and picking up watermark according to the idea of frequency modulation. This kind of watermark technique can give attention to invisibleness and robustness, and realize blind examination efficiently The experiments show that the technique has the properties of combing invisibility and robustness as well as achieving efficient blind detection.
摘要:
In account of the heterogeneous data existed in the e-commerce, the solution of heterogeneous database data exchange middleware based on XML is brought up. With the beginning of heterogeneous data integration, this paper combined with the examples of e-commerce platform construction, realized the transformation and integration of the relational data to XML data, which provided the underlying support for the data sharing, publishing and application access among various systems.
摘要:
In this paper, a system for PPPoE protocol analysis is designed and implemented. The system includes three modules: network capture module, traffic analysis module and information log module. The network packets are captured by Winpcap which can enhance high correctness and efficiency of the network capture. The mechanism of PPPoE data communication and the packet capture method of using Winpcap are introduced and the process of PPPoE protocol analysis is realized in detail. The protocol data in the log module is based on XML format and it can provide more readable information using XSLT. The algorithms of parsing the tag options and making packet markup in the XML file are realized. The experiment shows that the system can transform the whole protocol information correctly and this system can make the administrator and customer to make full use of the network advice on ADSL and check the network problem quickly.
关键词:
Remote OS detection;TCP/IP fingerprinting;ICMP detection;Libnet
摘要:
In this paper, the remote operating system detection is discussed and some detection methods which contain active detection and passive detection are studied and compared. The implement of remote operating system detection based on Libnet is provided and the architecture of total system is presented. The principle of Libnet is studied and it can improve detection performance and scalability. The detection that combines TCP/IP fingerprinting with ICMP detection is used in the scanning system and it can get high accuracy of remote operating system detection.
摘要:
Hilditch thinning algorithm is widely used in image pre-processing process. In this paper, we propose an improved Hilditch algorithm to acquire a more stable output. We conclude that the skeletons obtained from our algorithms give better results in Chinese characters and numbers. The advantage of this algorithm corrects the beard by modifying the warp in the part of intersection.
期刊:
DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS,2009年:382-385
会议名称:
第八届分布式计算及其应用国际学术研讨会(The 8th International Symposium on Distributed Computing and Applications to Business,Engineering and Science)
会议时间:
2009-10-16
会议地点:
武汉
会议论文集名称:
第八届分布式计算及其应用国际学术研讨会(The 8th International Symposium on Distributed Computing and Applications to Business,Engineering and Science)论文集
关键词:
Static Analysis;Defects Description;Syntax Tree Matching
摘要:
As an important software defects analysis method, static analysis is wildly used in software coding and test. But this traditional method is inextensible and inefficient that users have to find defects artificially. A framework is implemented to locate defects called DDS(Defects description system) and an annotation Language was designed to describe defects which named DDL(Defects Description Language). The rules written in DDL will be saved in rule set and can be used by DDS to locate the defects automatically. The experimental results demonstrate that the method is available to identify defects in programs.
通讯机构:
[Tong, Xiaojun] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430074, Peoples R China.
关键词:
FCM;the feature weigh;the center of clustering
摘要:
In the traditional fuzzy C-Means algorithm, each feature relationship and so on. However, owing to various of the samples plays a uniform contribution for clustering. But in fact due to the feature selection are not perfect, and their scalarization have some blindness, each feature of the feature vector is not uniform for clustering contribution, so we have to take into account the different effect of each feature seriously. In this paper, we get a method for calculating the feature weight based on the feature contribution balance principle and the most separate degree principle of intra-cluster. By the IRIS example, we find that the calculation method for weight can not only enhance the calculation speed, and also make the clustering result better than the existing result.
通讯机构:
[Tong, Xiaojun] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
会议名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)
会议时间:
2008-07-27
会议地点:
大连
会议论文集名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)论文集
摘要:
This article first used four steps of the compatible examination, the diversity examination, the relevant examination and the principal components analyzes to screen the handwritten digit Zernike moment, then we make use of the Fuzzy C-Mean cluster recognition of the hand-written numerals based on the screened Zernike moment. The example testified this method effective, and provides the theory basis for further establishment of the hand-written numeral recognition standard library. In this process, we have also discovered two reasons which cause the Fuzzy C-Mean cluster to be unefficient.
期刊:
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31,2008年:10758-10763
通讯作者:
Gao, Quansheng
作者机构:
[Gao, Quansheng] Wuhan Polytech Univ, Dept Math & Phys, Wuhan, Peoples R China.
通讯机构:
[Gao, Quansheng] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan, Peoples R China.
会议名称:
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)
会议时间:
2008-10-12
会议地点:
大连
会议论文集名称:
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)论文集
关键词:
coherent risk measure;importance sampling;ranking and selection
摘要:
Importance sampling is always used to modify the probabilities for rare event occurrences that govern the outcomes of the simulation in a way that allows for low probability events to occur more frequently. In this paper, importance sampling is applied to accelerate the simulation for coherent risk measure based on generalized rare scenarios. Firstly, we show how to combine importance sampling with ranking and selection method provided by Lesnevski, Nalson and Staum to accelerate simulation coherent risk measure directly. Secondly, recursive Robbins-Monro type algorithm is introduced to estimate the parameters of optimal sampling distributions. Finally, computational efficiency of simulated confidence intervals for coherent risk measure is discussed under three simulation settings: Asian call option, Asian options on partial average, down-and-in barrier call option.
摘要:
Infinite generalized block Hankel matrix is associated with controllability matrix and transfer function matrix of multi-input and multi-output linear system, the finite rank and decomposition of infinite generalized block Hankel matrix are discussed, it is obtained the necessary and sufficient condition of that infinite generalized block Hankel matrix has finite rank and that any infinite. generalized block Hankel matrix could be decomposed a product of two matrices, which are the infinite block observability matrix and the infinite block controllability matrix of the minimal realization system in its corresponding strictly proper rational fraction function matrix. In addition, the invertibility of finite block Hankel matrix is also discussed. A new method to study this class of matrices and their relative matrices is presented.
摘要:
The objective of this paper is to study the effect of efficient importance sampling (EIS) techniques on simulating the distribution-invariant convex risk measures: utility-based shortfall risk measures (USR). We firstly introduce EIS to simulate USR based on nonlinear Generalized Least Squares and demonstrate how to choose a candidate density in the context of multi-normal distributions. After presenting the construction of our algorithm, we apply our efficient scheme for calculating Entropic risk measure under the setting of the mixed Poisson model of CreditRisk(+). We furthermore make an improvement for EIS so that we can calculate USR with piecewise polynomial function loss functions. Finally, the method is applied to an example to demonstrate its performance and flexibility.
摘要:
The objective of knowledge processing system is to promote knowledge integration, sharing and retrieval in distributed and heterogeneous environment. This paper Puts forward an ontology-based model-OBKPM for knowledge processing, which promises better access to relevant knowledge by producing a global domain ontology that is used for establishing semantic connections among the local ontologies of autonomous knowledge sources as well as for retrieving those sources. In OBKPM, a bottom-up integration approach with two-stage mapping process is proposed to solve both the semantic heterogeneities and the query answering problems. In this approach, local ontologies and the global ontology are all treated in graph-based representation, and the overall integration and access process will be briefly illustrated through examples.
摘要:
This paper introduces architecture and feature of 32-bit micro-processor, and describes internal data path in processor. Through analysis of function and theory of RISC CPU instruction decoder module, we design instruction decoder (ID) module of 32-bit CPU by pipeline theory. The instruction decoder includes register file, write back data to register file, sign bit extend, relativity check, and it is simulated on QuartusII successfully. Static time sequence shows the instruction decode module completing required function.
期刊:
2008 INTERNATIONAL CONFERENCE ON RISK MANAGEMENT AND ENGINEERING MANAGEMENT, ICRMEM 2008, PROCEEDINGS,2008年:536-541
通讯作者:
Gao, Q.-S.(gqsh0101@yahoo.com.cn)
作者机构:
[Gao Quan-sheng] Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
通讯机构:
Department of Mathematics and Physics, Wuhan Polytechnic University, China
摘要:
A framework of combining importance sampling with Structured Database Monte Carlo strategy is developed. The proposed method attempts to devise a generic method for designing importance sampling method. Firstly, evaluation function and objective function are expressed in a way that there is a linear relation between response estimator and majorized function. Order structure is imposed not only on sample paths but also on parameters of candidate density. Then the parameters are estimated by surrogate maximization algorithm. Secondly, cut-off point at which response function can maintain the same sample paths structure is obtained. Based on the low quadratic bound principle and the convexity of the second moment of the estimator, a quadratic surrogate function for objective function is derived. Finally, empirical results show that our approach is straightforward to implement and flexible to be applied in a generic Monte Carlo setting.
摘要:
This paper first shows the relationship and its characteristics of logistics outsourcing based on the supply chain management environment. According to the theory of interface management, the interrelation in logistics outsourcing is treated as a kind of interface. After analyzing the all kinds of interface in logistic outsourcing, the relationship of them is expounded, and corresponding methods, measures are put forward.
会议名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)
会议时间:
2008-07-27
会议地点:
大连
会议论文集名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)论文集
关键词:
MIPS;RISC;VHDL;FPGA;CPU;General Register
摘要:
This paper discusses a kind of 32-bit high performance microprocessor instruction set structure, and introduces design and implementation of general register. We do research on logic of register file and circuit optimization design. Furthermore, we design port share and controller-circuit with stagger read-write circuit. Emphase of our research is implementation of general register file, which includes two pipeline processes: launch and acknowledgement. We design one clock signal, one write-enable signal, one write-target register port and one write data port in launch stage; We design two read-source register ports and two output data port in acknowledgement stage. Finally this paper also verifies function of register file.
期刊:
PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON RISK AND RELIABILITY MANAGEMENT, VOLS I AND II,2008年:15-20
作者机构:
[Chen, Gao-bo; Gao, Quansheng] Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
会议名称:
2008 International Conference on Risk and Relianility Management(2008风险与可靠性管理国际会议)
会议时间:
2008-11-10
会议地点:
北京
会议论文集名称:
2008 International Conference on Risk and Relianility Management(2008风险与可靠性管理国际会议)论文集
关键词:
centered moment of order p;efficient importance sampling;option pricing
摘要:
The optimal parameters of candidate measures established by importance sampling are usually obtained by minimizing the quadratic criterion. Efficient importance sampling (EIS) implements such quadratic criterion by a generic procedure known as generalized least squares or its modification as weighted least squares. Firstly, EIS is extended by changing the optimal criterion from quadratic criterion to p-order (P >= 1) relative centered moment criterion. Secondly, two methods are developed to get the optimal parameters of candidate measures. The first one is also solving a weighted least squares problem with different weights from those of the naive EIS. The second one is solving a p-norm optimal problem. Finally, the proposed efficient important sampling with p-order relative centered moment minimization method (p-EIS) is used for pricing options and comparing its performance to some other alternative IS strategies. Simulation experiment is specialized to Gaussian kernel setting, showing that if a non-quadratic centered moment is used in the optimality criterion, different performance results are obtained.
摘要:
This paper describes the design and research of intrusion detection rules in the distributed intrusion detection system which is based on agent. The hierarchical framework model based on intelligent agents is proved in the distribute intrusion system. The model involves three kinds of intelligent agents: A type agent, B type agent and C type agent which have different task. The definition and analysis of intrusion rules in the agent is discussed. This article also studies how to use the XML to design the system data and intrusion detection rules. The definition and transportation of four kings of data called XML protocol data, XML control information, XML intrusion detection rules and XML intrusion response in the agent is presented. The IAP and SSL are used to solve the safety of XML data transported between two agents in the system.