首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A direction of improvement of a method for formation of color images on offset plates is proposed. The method and tools developed for synthesizing color images are experimentally tested. Translated from Kibernetika i Sistemnyi Analiz, No. 3, pp. 99–109, May–June, 2000.  相似文献   

2.
In this paper, we shall propose a method to hide a halftone secret image into two other camouflaged halftone images. In our method, we adjust the gray-level image pixel value to fit the pixel values of the secret image and two camouflaged images. Then, we use the halftone technique to transform the secret image into a secret halftone image. After that, we make two camouflaged halftone images at the same time out of the two camouflaged images and the secret halftone image. After overlaying the two camouflaged halftone images, the secret halftone image can be revealed by using our eyes. The experimental results included in this paper show that our method is very practicable. The text was submitted by the authors in English. Wei-Liang Tai received his BS degree in Computer Science in 2002 from Tamkang University, Tamsui, Taiwan, and his MS degree in Computer Science and Information Engineering in 2004 from National Chung Cheng University, Chiayi, Taiwan. He is currently a PhD student of Computer Science and Information Engineering at National Chung Cheng University. His research fields are image hiding, digital watermarking, and image compression. Chi-Shiang Chan received his BS degree in Computer Science in 1999 from National Cheng Chi University, Taipei, Taiwan, and his MS degree in Computer Science and Information Engineering in 2001 from National Chung Cheng University, Chiayi, Taiwan. He is currently a PhD student of Computer Science and Information Engineering at National Chung Cheng University. His research fields are image hiding and image compression. Chin-Chen Chang received his BS degree in Applied Mathematics in 1977 and his MS degree in Computer and Decision Sciences in 1979, both from National Tsing Hua University, Hsinchu, Taiwan. He received his PhD in Computer Engineering in 1982 from National Chiao Tung University, Hsinchu, Taiwan. During the academic years of 1980–1983, he was on the faculty of the Department of Computer Engineering at National Chiao Tung University. From 1983–1989, he was on the faculty of the Institute of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan. From 1989 to 2004, he has worked as a professor in the Institute of Computer Science and Information Engineering at National Chung Cheng University, Chiayi, Taiwan. Since 2005, he has worked as a professor in the Department of Information Engineering and Computer Science at Feng Chia University, Taichung, Taiwan. Dr. Chang is a fellow of the IEEE, a fellow of the IEE, and a member of the Chinese Language Computer Society, the Chinese Institute of Engineers of the Republic of China, and the Phi Tau Phi Society of the Republic of China. His research interests include computer cryptography, data engineering, and image compression.  相似文献   

3.
Michael Ostwald briefly describes the Golden Mean and its history before examining the stance taken by a number of recent authors investigating the Golden Mean in architecture. He addresses the theories of Husserl, Derrida and Ingraham, who separately affirm that tacit assumptions about the relationship between geometric forms and other forms – say geometry and architecture – must be constantly questioned if they are to retain any validity.  相似文献   

4.
Data on global conflicts took place from 750 B.C. up to now are analyzed and their general pattern is revealed. An attempt is made to foresee the next global conflict called the conflict of the 21st century. Its nature and main characteristics are analyzed. Main global threats are listed, and their impact on five groups of countries is determined using cluster analysis. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 5, pp. 87–99, September–October 2007.  相似文献   

5.
A three-dimensional network and its application to the analysis of images are described. This multilevel architecture studies partial correlations between structural components of an image. An algorithm is proposed that formalizes a new approach to the decomposition of images. An image is transformed so that each pixel contains information on the spatial structure of its neighborhood. The most correlated information is first formed, which ensures the resistance of the algorithm to small structural changes. Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 114–133, March–April, 2000.  相似文献   

6.
To represent the functions in terms of which expansions are constructed, the so-called dp-, pt -, and dt -operators are used. The existence of polynomial expansions of Boolean functions in functions obtained by applying heterogeneous operators of the above-mentioned types to a nondegenerate Boolean function is proved. Some methods of finding coefficients of these expansions are also considered. Translated from Kibernetika i Sistemnyi Analiz, No. 3, pp. 40–55, May–June, 2000.  相似文献   

7.
This paper is one of a set of lessons prepared for the course of “Theory of Architecture” (Faculty of Architecture – “La Sapienza” University of Rome). The didactic aim was to present – to students attending the first year of courses – some methods for the beginning stages of design and their applicability to any kind creative work. The brief multimedia hypertext quoted at the end of this paper was carried out in collaboration with the “LaMA” (Laboratorio Multimediale di Architettura) as a test for new educational tools applied to first our “e-learning” experiences.  相似文献   

8.
An approach to automate the extraction and measurement of roots in minirhizotron images is presented. Two-dimensional matched filtering is followed by local entropy thresholding to produce binarized images from which roots are detected. After applying a root classifier to discriminate fine roots from unwanted background objects, a root labeling method is implemented to identify each root in the image. Once a root is detected, its length and diameter are measured using Dijkstra’s algorithm for obtaining the central curve and the Kimura–Kikuchi–Yamasaki method for measuring the length of the digitized path. Experimental results from a collection of peach (Prunus persica) root images demonstrate the effectiveness of the approach.  相似文献   

9.
The paper reviews studies on the representations and expansions of weighted pseudoinverse matrices with positive semidefinite weights and on the construction of iterative methods and regularized problems for the calculation of weighted pseudoinverses and weighted normal pseudosolutions based on these representations and expansions. The use of these methods to solve constrained least squares problems is examined. Continued from Cybernetics and Systems Analysis, 44, No. 1, 36–55 (2008). __________ Translated from Kibernetika i Sistemnyi Analiz, No. 3, pp. 75–102, May–June 2008.  相似文献   

10.
The paper reviews studies on the representations and expansions of weighted pseudoinverse matrices with positive definite weights and on iterative methods and regularized problems for calculation of weighted pseudoinverse matrices and weighted normal pseudosolutions. The use of these methods to solve constrained least-squares problems is examined. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 47–73, January–February 2008.  相似文献   

11.
Existing methods of simulation of motion of rigid bodies are considered that take into account collisions and joints of such bodies. A new fast universal fixed-step-size algorithm of speed constraints is proposed. This algorithm combines all the advantages of well-known algorithms and is deprived of their drawbacks. Using a modified Dantzig method, the upper time estimate equal to O(4k) is obtained for the algorithm. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 29–38, July–August 2005.  相似文献   

12.
13.
The CLADYN compressor banks on the topological properties of a color image to achieve the highest possible data rate reduction with the minimum amount of visible degradation.In the case of numerical color TV, the input data at 166 MB/s is the CCIR imposed luminance Y and chrominance B- Y, RY components. The compressor output is at 25.26 MB/s, exclusive of sound channels and error correcting overhead. High reconstructed picture quality is obtained (at the rate of 6.56/1) without the use of any TV temporal redundancy. In the case of multispectral images, excellent image reconstruction is obtained with a signal to quantization noise ranging from 40 to 50 dBs and with a data rate reduction factor higher than 4/1 for scenes comprising 3–5 spectral channels. This type of compressor is not very sensitive to channel misregistration, is robust to the propagation of the transmission errors and outputs fixed length words.  相似文献   

14.
The model of the device of reading (visualization) of the hidden magnetic information from the holograms combined with magneto-optical layer is presented in the article. Ways of magnetic images formation on the protected documentation and their reading by magneto-optical methods are proposed. The reading head with the help of magneto-optical meridional Kerr effect allows to observe visually of “effect of blinking” from the hologram with the hidden magnetic layer. During the work the mathematical analysis magneto-optical Kerr or Faraday effects was carried out. The hidden magnetic image based on:
–  hard magnetic layer on basis Tb-Fe with perpendicular anisotropy
–  soft magnetic layers on a basis or permalloy.
Advantages of the device:
–  non contact reading of the magnetic information
–  difficulty of recurrence of magnetic images formation technology.
The optical scheme of devices contains a light source, the polarizer, the analyzer, the hologram with magneto-optic layers, and constant magnet. The hologram is placed between the polarizer and the analyzer. The text was submitted by the authors in English.  相似文献   

15.
We further simplify Paterson’s version of the Ajtai–Komlós–Szemerédi sorting network, and its analysis, mainly by tuning the invariant to be maintained.  相似文献   

16.
Stability, pseudostability, and quasistability, and the stability kernel of a multicriterion problem are considered on a system of subsets with Σ-minimax and Σ-minimin criteria for perturbations of the parameters of a vector criterion. Lower attainable estimates are found for the radii of stability, quasi stability, and pseudostability and the stability kernel of such a problem in the space of perturbed parameters for the case of the Chebyshev norm. This work has been carried out with financial support from the Fundamental Research Fund of the Republic of Belorussia and the German Fund of Academic Exchanges (DAAD), FRG. Translated from Kibernetika i Sistemnyi Analiz, No. 5, pp. 111–124, September–October, 1999.  相似文献   

17.
Recent research suggests that there are natural connections between quantum information theory and the Yang–Baxter equation. In this paper, in terms of the almost-complex structure and with the help of its algebra, we define the Bell matrix to yield all the Greenberger–Horne–Zeilinger (GHZ) states from the product basis, prove it to form a unitary braid representation and presents a new type of solution of the quantum Yang–Baxter equation. We also study Yang–Baxterization, Hamiltonian, projectors, diagonalization, noncommutative geometry, quantum algebra and FRT dual algebra associated with this generalized Bell matrix.   相似文献   

18.
A method is proposed to estimate and rank alternative decisions with interval representation of their characteristics. The method is verified experimentally. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 148–153, July–August 2005.  相似文献   

19.
The main stages of formation and development of automata theory and its applications to computer-aided design of computing systems are considered. Some open problems of modern theoretical cybernetics are discussed. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 5, pp. 3–7, September–October 2007.  相似文献   

20.
This paper deals with the algebra of algorithmics in the context of developing modern means of transformation and synthesis of algorithms and programs in object-oriented environments. This report was first presented by the author in English at the conference ECI-2005 (Kosice, Slovakia). __________ Translated from Kibernetika i Sistemnyi Analiz, No. 5, pp. 165–173, September–October 2006.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号