首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   1篇
工业技术   10篇
  2019年   1篇
  2018年   2篇
  2017年   1篇
  2015年   1篇
  2013年   2篇
  2004年   1篇
  2001年   1篇
  1999年   1篇
排序方式: 共有10条查询结果,搜索用时 31 毫秒
1
1.
2.
Search, retrieval and storage of video content over the Internet and online repositories can be efficiently improved using compact summarizations of this content. Robust and perceptual fingerprinting codes, extracted from local video features, are astutely used for identification and authentication purposes. Unlike existing fingerprinting schemes, this paper proposes a robust and perceptual fingerprinting solution that serves both video content identification and authentication. While content identification is served by the robustness of the proposed fingerprinting codes to content alterations and geometric attacks, their sensitivity to malicious attacks makes them fit for forgery detection and authentication. This dual usage is facilitated by a new concept of sequence normalization based on the circular shift properties of the discrete cosine and sine transforms (DCT and DST). Sequences of local features are normalized by estimating the circular shift required to align each of these sequences to a reference sequence. The fingerprinting codes, consisting of normalizing shifts, are properly modeled using information-theoretic concepts. Security, robustness and sensitivity analysis of the proposed scheme is provided in terms of the security of the secret keys used during the proposed normalization stage. The computational efficiency of the proposed scheme makes it appropriate for large scale and online deployment. Finally, the robustness (identification-based) and sensitivity (authentication-based) of the proposed fingerprinting codes to content alterations and geometric attacks is evaluated over a large set of video sequences where they outperform existing DCT-based codes in terms of robustness, discriminability and sensitivity to moderate and large size intentional alterations.  相似文献   
3.
Software metrics are used to measure different attributes of software. To practically measure software attributes using these metrics, metric thresholds are needed. Many researchers attempted to identify these thresholds based on personal experiences. However, the resulted experience-based thresholds cannot be generalized due to the variability in personal experiences and the subjectivity of opinions. The goal of this paper is to propose an automated clustering framework based on the expectation maximization (EM) algorithm where clusters are generated using a simplified 3-metric set (LOC, LCOM, and CBO). Given these clusters, different threshold levels for software metrics are systematically determined such that each threshold reflects a specific level of software quality. The proposed framework comprises two major steps:the clustering step where the software quality historical dataset is decomposed into a fixed set of clusters using the EM algorithm, and the threshold extraction step where thresholds, specific to each software metric in the resulting clusters, are estimated using statistical measures such as the mean (μ) and the standard deviation (σ) of each software metric in each cluster. The paper's findings highlight the capability of EM-based clustering, using a minimum metric set, to group software quality datasets according to different quality levels.  相似文献   
4.
Multimedia Tools and Applications - Compact representations of color image and video content allow efficient search, retrieval and storage of this content over the Internet and online repositories....  相似文献   
5.
The comparative study between unsteady flow models in alluvial streams shows a chaotic residue as for the choices of a forecasting model. The difficulty resides in the choice of the expressions of friction resistance and sediment transport. Three types of mathematical models were selected. Models of type one and two are fairly general, but require a considerable number of boundary conditions, which related to each size range of sediments. It can be a handicap during rivers studies which are not very well followed in terms of experimental measurements. Also, the use of complex models is not always founded. But then, the model of type three requires a limited number of boundary conditions and solves only a system of three equations at each time step. It allows a considerable saving in calculating times.  相似文献   
6.
Leak detection and localization in water pipeline networks is of paramount importance to industry, especially in regions where water is scarce. In this paper, we present a novel multi-modal and multi-scale approach for leak detection and localization in water pipeline networks, in which pressure measurements at various points on the network are used to localize the pipe segment in which the leak is occurring, and then the vibration sensors are used to localize the leak within this segment. In some situations where the complete pipeline model is not available, pressure data alone may not be effective in localizing the leak. However, in such a situation, by supplementing pressure data with vibration data, the leak can be localized, as these additional data are easier to acquire at arbitrary points, since vibration sensors are non-invasive. In order to validate the effectiveness of the approach that needs both pressure and vibration data, we simulate the pipeline model using EPANET that includes models for flow and pressure at various points on the pipeline, then integrate the vibration model with it in MATLAB, since EPNAET does not include models for vibration measurements. A case study of a pipeline network is considered, and the proposed scheme is used to detect and localize the leak. Extensive simulation results show the effectiveness of the proposed scheme in providing accurate leak detection and localization.  相似文献   
7.
8.
Laboratory results of use in making oil wells more productive are contained in this paper.  相似文献   
9.
In a preliminary study, samples of Moroccan wines (n = 30), beers (n = 5) and fruit juices (n = 14) were assayed for ochratoxin A (OTA) by HPLC with fluorimetric detection, followed by confirmation by cleavage of the OTA molecule using carboxypeptidase with HPLC-fluorimetric determination of ochratoxin alpha (OT alpha). All the wine samples were contaminated, and the overall median OTA concentration was 0.65 microg/l (range 0.028-3.24 microg/l). One of the 14 samples of fruit juices was contaminated with a concentration of 1.16 microg/l, whereas none of the five beer samples was contaminated. This is the first report on the occurrence of OTA in various beverages from Morocco.  相似文献   
10.
We use data from two satellites and a terrestrial carbon model to quantify the impact of urbanization on the carbon cycle and food production in the US as a result of reduced net primary productivity (NPP). Our results show that urbanization is taking place on the most fertile lands and hence has a disproportionately large overall negative impact on NPP. Urban land transformation in the US has reduced the amount of carbon fixed through photosynthesis by 0.04 pg per year or 1.6% of the pre-urban input. The reduction is enough to offset the 1.8% gain made by the conversion of land to agricultural use, even though urbanization covers an area less than 3% of the land surface in the US and agricultural lands approach 29% of the total land area. At local and regional scales, urbanization increases NPP in resource-limited regions and through localized warming “urban heat” contributes to the extension of the growing season in cold regions. In terms of biologically available energy, the loss of NPP due to urbanization of agricultural lands alone is equivalent to the caloric requirement of 16.5 million people, or about 6% of the US population.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号