-
Chapter and Conference Paper
Semantics and completeness of Duration Calculus
Duration Calculus was introduced in [1] as a notation to specify real-time systems, and as a calculus to verify theorems about such systems. Its distinctive feature is reasoning about durations of states within a...
-
Chapter and Conference Paper
Sign Correlation Detector for Blind Image Watermarking in the DCT Domain
Digital watermarking is a key technique for protecting intellectual property of digital media. Due to the ability to detect watermark without the original image, blind watermarking is very useful if there are ...
-
Chapter and Conference Paper
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain
Digital watermarking is a key technique for protecting intellectual property of digital media. As a number of methods have been proposed in recent years to embed watermarks in images for various applications, ...
-
Chapter and Conference Paper
Agent-Based Social Simulation and Modeling in Social Computing
Agent-based social simulation (ABSS) as a main computational approach to social simulation has attracted increasing attention in the field of social computing. With the development of computer and information ...
-
Chapter and Conference Paper
Information Service System For Small Forestowners
Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...
-
Chapter and Conference Paper
Robust Block and Gray-Level Histogram Based Watermarking Scheme
As one of the crucial problems in watermarking, robustness against geometric distortion and JPEG compression becomes more than challenging and problematic. In this paper, a robust watermarking scheme based on ...
-
Chapter and Conference Paper
Optimal Inversion of Open Boundary Conditions Using BPNN Data-Driven Model Combined with Tidal Model
One of major difficulties with numerical tidal models is accurate inversion of open boundary conditions. A data-driven model based on artificial neural network is developed to retrieve open boundary values. Al...
-
Chapter and Conference Paper
Robust Image Matching Method Based on Complex Wavelet Structural Similarity
We apply the complex wavelet structural similarity index to image matching system and propose an image matching method which has strong robustness to image transform in spatial domain. Experimental results sho...
-
Chapter and Conference Paper
Agent-Based Modeling of Netizen Groups in Chinese Internet Events
Internet events are public events with the participation of netizens to express their opinions or comments. As an emerging phenomenon, Internet events often draw nationwide attention and eventually influence o...
-
Chapter and Conference Paper
Identification and Analysis of Cell Cycle Phase Genes by Clustering in Correspondence Subspaces
Correspondence analysis (CA) is a statistical method that is widely used in multiple disciplines to reveal relationships amongst variables. Among others, CA has been successfully applied for microarray data an...
-
Chapter and Conference Paper
Legal Theoretical Analysis on the Market Economy Mode of China—Discussing from the Status of Market Economy in Anti-dumpling
Most of the discussion on Chinese market economy mode stayed in the representation, such as government-led and mixed economic model. However, the in-depth analysis of the reason for the formation of Chinese mo...
-
Chapter and Conference Paper
Research on Puncture Area Calibration of Image Navigation for Radio Frequency Ablation Robot
Aiming at puncture image characteristic of robot auxiliary radio frequency ablation, a modified tradition camera calibration method is proposed in this paper. Based on the comprehensive analysis for puncture i...
-
Chapter and Conference Paper
Vision-Guided Robot Tracking Algorithm Based on Characteristic Description of Maneuvering Target
The change of appearance characteristic is caused by changing viewpoint in the maneuvering target tracking. The traditional Camshift tracking algorithm based on a single color histogram model is not robust to ...
-
Chapter and Conference Paper
Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology
Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...
-
Chapter and Conference Paper
A Method of Software Defects Mining Based on Static Analysis
Software defects are easy to cause when programming by C++ language, because of its features of flexibility and complexity, as well as its large number of undefined behaviors. According to “MISRA C++ 2008” saf...
-
Chapter and Conference Paper
An Algorithm of Channel Assignment of MAC Layer in Ad Hoc Network Based on Dynamic Game with Perfect and Complete Information
The nodes in Ad Hoc networks compete channels when communicating, with the features of no center and self-organization. In traditional channel assignment strategy of MAC layer, each node does not consider the ...
-
Chapter and Conference Paper
The Study of Path Planning of Welding Manipulator Based on Improved Genetic Algorithm
One of the key problems of welding manipulator design is Path planning. It is of great significance to Planning out a reasonable path for manipulator to increase the productivity of the manipulator. Using impr...
-
Chapter and Conference Paper
A Comparative Study on Full- and Half-Duplex Relaying Protocols with Practical Channel Estimates
This paper investigates the performance of cooperative relaying protocols with practical channel estimates. Two relaying protocols, i.e., the full duplex relaying (FDR) protocol and half duplex relaying (HDR) ...
-
Chapter and Conference Paper
Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks
In node capture attacks, an attacker intellectually captures nodes and extracts cryptographic keys from their memories to wreck security, reliability and confidentiality of wireless sensor networks. Previous m...
-
Chapter and Conference Paper
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage
Outsourcing data to are remote cloud service provider allows organizations or individual users to store more data on the cloud storage than on private computer systems. However, a specific problem encountered ...