首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
化学工业   1篇
轻工业   1篇
无线电   1篇
自动化技术   9篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2019年   3篇
  2016年   1篇
  2015年   1篇
  2013年   1篇
  2010年   1篇
  2009年   1篇
排序方式: 共有12条查询结果,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - Multimedia communication is revolutionizing all major spheres of human life. The advent of IoT and its applications in many fields like sensing, healthcare and...  相似文献   
2.
Multimedia Tools and Applications - Secret sharing is a cryptographic tool to ensure reliable and secure access to information. Counting-based secret sharing is a new secret sharing technique that...  相似文献   
3.
Multimedia Tools and Applications - The secret sharing scheme is a data security tool to provide safe reliability and robustness for multi-user authentication systems. This work focus on expanding...  相似文献   
4.
本文提出了一种新的RGB图像掩密算法.该算法引进了在每个像素的三个色通道(R、G、B)分别存储可变位数的概念,这个可变位数(Bit)是由像素的实际颜色值决定的,即较低颜色值的色通道可存储较大的位数量.与其他现有算法相比,该算法能够为掩护媒体提供一个相对大的存储量.本实验结果证明了该算法的优越性,同时还给出了与其他图像掩密算法的对比结果.  相似文献   
5.
Multimedia Tools and Applications - Secret Sharing is required in situations where access to important resources has to be protected by more than one person. We propose new secret-sharing scheme...  相似文献   
6.
Right of way     
Pedestrian models typically represent interactions between agents in a symmetric fashion. In general, these symmetric relationships are valid for a large number of crowd simulation scenarios. However, there are many cases in which symmetric responses between agents are inappropriate, leading to unrealistic behavior or undesirable simulation artifacts. We present a novel formulation, called right of way, which provides a well-disciplined mechanism for modeling asymmetric relationships between pedestrians. Right of way is a general principle, which can be applied to different types of pedestrian models. We illustrate this by applying right of way to three different pedestrian models (two based on social forces and one based on velocity obstacles) and show its impact in multiple scenarios. Particularly, we show how it enables simulation of the complex relationships exhibited by pilgrims performing the Islamic religious ritual, the Tawaf.  相似文献   
7.
Multimedia Tools and Applications - Counting-based secret sharing is becoming a vital efficient multimedia technique for raising the security of sensitive data especially when collective access to...  相似文献   
8.
This paper presents a processor architecture for elliptic curve cryptography computations over GF(p). The speed to compute the Elliptic-curve point multiplication over the prime fields GF(p) is increased by using the maximum degree of parallelism, and by carefully selecting the most appropriate coordinates system. The proposed Elliptic Curve processor is implemented using FPGAs. The time, area and throughput results are obtained, analyzed, and compared with previously proposed designs showing interesting performance and features.  相似文献   
9.
Removal of CN? from liquid solutions was studied experimentally by an anodic oxidation technique under various operating conditions. A new cell configuration was used, the cell consists of four vertical graphite rod anodes distributed at 90° on the circular circumference at a distance of 3 cm from the wall and surrounded by two cylindrical stainless steel screen cathodes from the inner and the outer side. Parameters investigated are the initial concentration of cyanide ions, applied current density, initial pH of the electrolyte, and electrolyte conductivity. All parameters were investigated at an operating time of 3 h. The % removal increased upon increasing the applied current density, increasing the electrolyte conductivity, and decreasing the initial concentration of CN?. Increasing initial pH from 4 to 8 increased the % removal by a factor ranging from 55 to 73%, further increase of pH up to 12 slightly increased the % removal (3–8%).

Application of the present electrochemical reactor in treating cyanide containing effluents from different industries was highlighted.  相似文献   
10.

Steganography is used for multimedia data security. It is a process of hiding the data within multimedia communication between the parties embedding the secret data inside a carrier file to be protected during its transmission. The research focus is on hiding within Arabic text steganography as a current challenging research area. The work innovation is utilizing text pseudo-spaces characters for data hiding. We present two studies for this text Steganography utilizing pseudo-spaces alone as well as combined with Kashida (extension character) as the old Arabic text stego techniques. Experimental results have shown that the proposed algorithms achieved high capacity and security ratio as compared to state-of-the-art Steganography methods presented for Arabic language. The proposed pseudo-spaces stego technique is of great benefit that can be further used for languages similar to Arabic such as Urdu and Persian as well as opening direction of text-stego research for other languages of the world.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号